openSUSE Updates
Threads by month
- ----- 2025 -----
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- 3 participants
- 22622 discussions
17 Dec '24
# Security update for subversion
Announcement ID: SUSE-SU-2024:4366-1
Release Date: 2024-12-17T16:38:47Z
Rating: moderate
References:
* bsc#1234317
Cross-References:
* CVE-2024-46901
CVSS scores:
* CVE-2024-46901 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46901 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* Server Applications Module 15-SP5
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for subversion fixes the following issues:
* CVE-2024-46901: Fixed denial-of-service via control characters in paths in
mod_dav_svn (bsc#1234317)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4366=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4366=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4366=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4366=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4366=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4366=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4366=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-4366=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-4366=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libsvn_auth_gnome_keyring-1-0-1.14.1-150400.5.3.1
* subversion-devel-1.14.1-150400.5.3.1
* subversion-ruby-debuginfo-1.14.1-150400.5.3.1
* subversion-server-1.14.1-150400.5.3.1
* subversion-perl-1.14.1-150400.5.3.1
* subversion-python-1.14.1-150400.5.3.1
* libsvn_auth_kwallet-1-0-debuginfo-1.14.1-150400.5.3.1
* subversion-tools-debuginfo-1.14.1-150400.5.3.1
* subversion-python-debuginfo-1.14.1-150400.5.3.1
* subversion-perl-debuginfo-1.14.1-150400.5.3.1
* libsvn_auth_kwallet-1-0-1.14.1-150400.5.3.1
* subversion-debugsource-1.14.1-150400.5.3.1
* subversion-tools-1.14.1-150400.5.3.1
* subversion-ruby-1.14.1-150400.5.3.1
* subversion-1.14.1-150400.5.3.1
* subversion-debuginfo-1.14.1-150400.5.3.1
* subversion-server-debuginfo-1.14.1-150400.5.3.1
* libsvn_auth_gnome_keyring-1-0-debuginfo-1.14.1-150400.5.3.1
* openSUSE Leap 15.4 (noarch)
* subversion-bash-completion-1.14.1-150400.5.3.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libsvn_auth_gnome_keyring-1-0-1.14.1-150400.5.3.1
* subversion-devel-1.14.1-150400.5.3.1
* subversion-ruby-debuginfo-1.14.1-150400.5.3.1
* subversion-server-1.14.1-150400.5.3.1
* subversion-perl-1.14.1-150400.5.3.1
* subversion-python-1.14.1-150400.5.3.1
* libsvn_auth_kwallet-1-0-debuginfo-1.14.1-150400.5.3.1
* subversion-tools-debuginfo-1.14.1-150400.5.3.1
* subversion-python-debuginfo-1.14.1-150400.5.3.1
* subversion-perl-debuginfo-1.14.1-150400.5.3.1
* libsvn_auth_kwallet-1-0-1.14.1-150400.5.3.1
* subversion-debugsource-1.14.1-150400.5.3.1
* subversion-tools-1.14.1-150400.5.3.1
* subversion-ruby-1.14.1-150400.5.3.1
* subversion-1.14.1-150400.5.3.1
* subversion-debuginfo-1.14.1-150400.5.3.1
* subversion-server-debuginfo-1.14.1-150400.5.3.1
* libsvn_auth_gnome_keyring-1-0-debuginfo-1.14.1-150400.5.3.1
* openSUSE Leap 15.5 (noarch)
* subversion-bash-completion-1.14.1-150400.5.3.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libsvn_auth_gnome_keyring-1-0-1.14.1-150400.5.3.1
* subversion-devel-1.14.1-150400.5.3.1
* subversion-ruby-debuginfo-1.14.1-150400.5.3.1
* subversion-server-1.14.1-150400.5.3.1
* subversion-perl-1.14.1-150400.5.3.1
* subversion-python-1.14.1-150400.5.3.1
* libsvn_auth_kwallet-1-0-debuginfo-1.14.1-150400.5.3.1
* subversion-tools-debuginfo-1.14.1-150400.5.3.1
* subversion-python-debuginfo-1.14.1-150400.5.3.1
* subversion-perl-debuginfo-1.14.1-150400.5.3.1
* libsvn_auth_kwallet-1-0-1.14.1-150400.5.3.1
* subversion-debugsource-1.14.1-150400.5.3.1
* subversion-tools-1.14.1-150400.5.3.1
* subversion-ruby-1.14.1-150400.5.3.1
* subversion-1.14.1-150400.5.3.1
* subversion-debuginfo-1.14.1-150400.5.3.1
* subversion-server-debuginfo-1.14.1-150400.5.3.1
* libsvn_auth_gnome_keyring-1-0-debuginfo-1.14.1-150400.5.3.1
* openSUSE Leap 15.6 (noarch)
* subversion-bash-completion-1.14.1-150400.5.3.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* subversion-1.14.1-150400.5.3.1
* subversion-devel-1.14.1-150400.5.3.1
* subversion-debuginfo-1.14.1-150400.5.3.1
* subversion-debugsource-1.14.1-150400.5.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* subversion-1.14.1-150400.5.3.1
* subversion-devel-1.14.1-150400.5.3.1
* subversion-debuginfo-1.14.1-150400.5.3.1
* subversion-debugsource-1.14.1-150400.5.3.1
* Development Tools Module 15-SP5 (noarch)
* subversion-bash-completion-1.14.1-150400.5.3.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* subversion-perl-1.14.1-150400.5.3.1
* subversion-python-1.14.1-150400.5.3.1
* subversion-tools-debuginfo-1.14.1-150400.5.3.1
* subversion-python-debuginfo-1.14.1-150400.5.3.1
* subversion-perl-debuginfo-1.14.1-150400.5.3.1
* subversion-debugsource-1.14.1-150400.5.3.1
* subversion-tools-1.14.1-150400.5.3.1
* subversion-debuginfo-1.14.1-150400.5.3.1
* Development Tools Module 15-SP6 (noarch)
* subversion-bash-completion-1.14.1-150400.5.3.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* subversion-perl-1.14.1-150400.5.3.1
* subversion-python-1.14.1-150400.5.3.1
* subversion-tools-debuginfo-1.14.1-150400.5.3.1
* subversion-python-debuginfo-1.14.1-150400.5.3.1
* subversion-perl-debuginfo-1.14.1-150400.5.3.1
* subversion-debugsource-1.14.1-150400.5.3.1
* subversion-tools-1.14.1-150400.5.3.1
* subversion-debuginfo-1.14.1-150400.5.3.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* subversion-server-1.14.1-150400.5.3.1
* subversion-debuginfo-1.14.1-150400.5.3.1
* subversion-debugsource-1.14.1-150400.5.3.1
* subversion-server-debuginfo-1.14.1-150400.5.3.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* subversion-server-1.14.1-150400.5.3.1
* subversion-debuginfo-1.14.1-150400.5.3.1
* subversion-debugsource-1.14.1-150400.5.3.1
* subversion-server-debuginfo-1.14.1-150400.5.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-46901.html
* https://bugzilla.suse.com/show_bug.cgi?id=1234317
1
0
17 Dec '24
# Security update for libsoup
Announcement ID: SUSE-SU-2024:4355-1
Release Date: 2024-12-17T12:35:18Z
Rating: important
References:
* bsc#1233285
* bsc#1233287
* bsc#1233292
Cross-References:
* CVE-2024-52530
* CVE-2024-52531
* CVE-2024-52532
CVSS scores:
* CVE-2024-52530 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-52530 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-52530 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-52531 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-52531 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-52531 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-52532 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-52532 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-52532 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for libsoup fixes the following issues:
* CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from
the ends of header names (bsc#1233285)
* CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in
soup_header_parse_param_list_strict (bsc#1233292)
* CVE-2024-52532: Fixed infinite loop while reading websocket data
(bsc#1233287)
Other fixes: \- websocket-test: disconnect error copy after the test ends
(glgo#GNOME/libsoup#391). \- fix an intermittent test failure
(glgo#GNOME/soup#399).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4355=1 openSUSE-SLE-15.6-2024-4355=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4355=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libsoup-3_0-0-3.4.4-150600.3.3.1
* libsoup-devel-3.4.4-150600.3.3.1
* libsoup-3_0-0-debuginfo-3.4.4-150600.3.3.1
* libsoup-debugsource-3.4.4-150600.3.3.1
* typelib-1_0-Soup-3_0-3.4.4-150600.3.3.1
* openSUSE Leap 15.6 (x86_64)
* libsoup-devel-32bit-3.4.4-150600.3.3.1
* libsoup-3_0-0-32bit-3.4.4-150600.3.3.1
* libsoup-3_0-0-32bit-debuginfo-3.4.4-150600.3.3.1
* openSUSE Leap 15.6 (noarch)
* libsoup-lang-3.4.4-150600.3.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libsoup-3_0-0-64bit-3.4.4-150600.3.3.1
* libsoup-3_0-0-64bit-debuginfo-3.4.4-150600.3.3.1
* libsoup-devel-64bit-3.4.4-150600.3.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libsoup-3_0-0-3.4.4-150600.3.3.1
* libsoup-devel-3.4.4-150600.3.3.1
* libsoup-3_0-0-debuginfo-3.4.4-150600.3.3.1
* libsoup-debugsource-3.4.4-150600.3.3.1
* typelib-1_0-Soup-3_0-3.4.4-150600.3.3.1
* Basesystem Module 15-SP6 (noarch)
* libsoup-lang-3.4.4-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-52530.html
* https://www.suse.com/security/cve/CVE-2024-52531.html
* https://www.suse.com/security/cve/CVE-2024-52532.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233285
* https://bugzilla.suse.com/show_bug.cgi?id=1233287
* https://bugzilla.suse.com/show_bug.cgi?id=1233292
1
0
# Security update for ovmf
Announcement ID: SUSE-SU-2024:4357-1
Release Date: 2024-12-17T12:52:23Z
Rating: moderate
References:
* bsc#1225889
Cross-References:
* CVE-2024-1298
CVSS scores:
* CVE-2024-1298 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
An update that solves one vulnerability can now be installed.
## Description:
This update for ovmf fixes the following issues:
* CVE-2024-1298: MdeModulePkg: Potential UINT32 overflow in S3 ResumeCount
(bsc#1225889)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4357=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-4357=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4357=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4357=1
## Package List:
* openSUSE Leap 15.3 (aarch64 x86_64)
* ovmf-tools-202008-150300.10.23.1
* ovmf-202008-150300.10.23.1
* openSUSE Leap 15.3 (noarch)
* qemu-ovmf-ia32-202008-150300.10.23.1
* qemu-ovmf-x86_64-202008-150300.10.23.1
* qemu-uefi-aarch32-202008-150300.10.23.1
* qemu-uefi-aarch64-202008-150300.10.23.1
* openSUSE Leap 15.3 (x86_64)
* qemu-ovmf-x86_64-debug-202008-150300.10.23.1
* SUSE Linux Enterprise Micro 5.1 (noarch)
* qemu-ovmf-x86_64-202008-150300.10.23.1
* qemu-uefi-aarch64-202008-150300.10.23.1
* SUSE Linux Enterprise Micro 5.2 (noarch)
* qemu-ovmf-x86_64-202008-150300.10.23.1
* qemu-uefi-aarch64-202008-150300.10.23.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
* qemu-ovmf-x86_64-202008-150300.10.23.1
* qemu-uefi-aarch64-202008-150300.10.23.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1298.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225889
1
0
17 Dec '24
# Security update for python-urllib3_1
Announcement ID: SUSE-SU-2024:4358-1
Release Date: 2024-12-17T13:17:48Z
Rating: moderate
References:
* bsc#1226469
Cross-References:
* CVE-2024-37891
CVSS scores:
* CVE-2024-37891 ( SUSE ): 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.6
* Python 3 Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for python-urllib3_1 fixes the following issues:
* CVE-2024-37891: Fixed proxy-authorization request header not stripped during
cross-origin redirects (bsc#1226469)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4358=1 openSUSE-SLE-15.6-2024-4358=1
* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-4358=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* python311-urllib3_1-1.26.18-150600.3.3.1
* Python 3 Module 15-SP6 (noarch)
* python311-urllib3_1-1.26.18-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-37891.html
* https://bugzilla.suse.com/show_bug.cgi?id=1226469
1
0
# Security update for curl
Announcement ID: SUSE-SU-2024:4359-1
Release Date: 2024-12-17T13:19:51Z
Rating: moderate
References:
* bsc#1234068
Cross-References:
* CVE-2024-11053
CVSS scores:
* CVE-2024-11053 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-11053 ( NVD ): 3.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for curl fixes the following issues:
* CVE-2024-11053: Fixed password leak in curl used for the first host to the
followed-to host under certain circumstances (bsc#1234068)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4359=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4359=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4359=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4359=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4359=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4359=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4359=1
* SUSE Linux Enterprise High Performance Computing 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-4359=1
* SUSE Linux Enterprise Server 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-4359=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-4359=1
* SUSE Linux Enterprise Desktop 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-4359=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4359=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4359=1
## Package List:
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* curl-debuginfo-8.0.1-150400.5.59.1
* curl-8.0.1-150400.5.59.1
* curl-debugsource-8.0.1-150400.5.59.1
* libcurl4-debuginfo-8.0.1-150400.5.59.1
* libcurl4-8.0.1-150400.5.59.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* curl-debuginfo-8.0.1-150400.5.59.1
* curl-8.0.1-150400.5.59.1
* curl-debugsource-8.0.1-150400.5.59.1
* libcurl4-debuginfo-8.0.1-150400.5.59.1
* libcurl4-8.0.1-150400.5.59.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* curl-debuginfo-8.0.1-150400.5.59.1
* curl-8.0.1-150400.5.59.1
* curl-debugsource-8.0.1-150400.5.59.1
* libcurl4-debuginfo-8.0.1-150400.5.59.1
* libcurl4-8.0.1-150400.5.59.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* curl-debuginfo-8.0.1-150400.5.59.1
* curl-8.0.1-150400.5.59.1
* curl-debugsource-8.0.1-150400.5.59.1
* libcurl4-debuginfo-8.0.1-150400.5.59.1
* libcurl4-8.0.1-150400.5.59.1
* libcurl-devel-8.0.1-150400.5.59.1
* Basesystem Module 15-SP5 (x86_64)
* libcurl4-32bit-debuginfo-8.0.1-150400.5.59.1
* libcurl4-32bit-8.0.1-150400.5.59.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* curl-debuginfo-8.0.1-150400.5.59.1
* curl-8.0.1-150400.5.59.1
* curl-debugsource-8.0.1-150400.5.59.1
* libcurl4-debuginfo-8.0.1-150400.5.59.1
* libcurl4-8.0.1-150400.5.59.1
* libcurl-devel-8.0.1-150400.5.59.1
* openSUSE Leap 15.4 (x86_64)
* libcurl-devel-32bit-8.0.1-150400.5.59.1
* libcurl4-32bit-debuginfo-8.0.1-150400.5.59.1
* libcurl4-32bit-8.0.1-150400.5.59.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libcurl4-64bit-debuginfo-8.0.1-150400.5.59.1
* libcurl4-64bit-8.0.1-150400.5.59.1
* libcurl-devel-64bit-8.0.1-150400.5.59.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* curl-debuginfo-8.0.1-150400.5.59.1
* curl-8.0.1-150400.5.59.1
* curl-debugsource-8.0.1-150400.5.59.1
* libcurl4-debuginfo-8.0.1-150400.5.59.1
* libcurl4-8.0.1-150400.5.59.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* curl-debuginfo-8.0.1-150400.5.59.1
* curl-8.0.1-150400.5.59.1
* curl-debugsource-8.0.1-150400.5.59.1
* libcurl4-debuginfo-8.0.1-150400.5.59.1
* libcurl4-8.0.1-150400.5.59.1
* libcurl-devel-8.0.1-150400.5.59.1
* openSUSE Leap 15.5 (x86_64)
* libcurl-devel-32bit-8.0.1-150400.5.59.1
* libcurl4-32bit-debuginfo-8.0.1-150400.5.59.1
* libcurl4-32bit-8.0.1-150400.5.59.1
* SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64)
* libcurl4-8.0.1-150400.5.59.1
* SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.59.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libcurl4-8.0.1-150400.5.59.1
* SUSE Linux Enterprise Desktop 15 SP5 (x86_64)
* libcurl4-8.0.1-150400.5.59.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* curl-debuginfo-8.0.1-150400.5.59.1
* curl-8.0.1-150400.5.59.1
* curl-debugsource-8.0.1-150400.5.59.1
* libcurl4-debuginfo-8.0.1-150400.5.59.1
* libcurl4-8.0.1-150400.5.59.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* curl-debuginfo-8.0.1-150400.5.59.1
* curl-8.0.1-150400.5.59.1
* curl-debugsource-8.0.1-150400.5.59.1
* libcurl4-debuginfo-8.0.1-150400.5.59.1
* libcurl4-8.0.1-150400.5.59.1
## References:
* https://www.suse.com/security/cve/CVE-2024-11053.html
* https://bugzilla.suse.com/show_bug.cgi?id=1234068
1
0
17 Dec '24
# Security update for docker
Announcement ID: SUSE-SU-2024:4360-1
Release Date: 2024-12-17T14:36:29Z
Rating: important
References:
* bsc#1217070
* bsc#1228324
* bsc#1228553
* bsc#1229806
* bsc#1230294
* bsc#1230331
* bsc#1230333
* bsc#1231348
* bsc#1232999
* bsc#1233819
Cross-References:
* CVE-2023-45142
* CVE-2023-47108
* CVE-2024-41110
CVSS scores:
* CVE-2023-45142 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-45142 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47108 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47108 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves three vulnerabilities and has seven security fixes can now
be installed.
## Description:
This update for docker fixes the following issues:
* Update docker-buildx to v0.19.2. See upstream changelog online at
<https://github.com/docker/buildx/releases/tag/v0.19.2>.
Some notable changelogs from the last update: *
<https://github.com/docker/buildx/releases/tag/v0.19.0> *
<https://github.com/docker/buildx/releases/tag/v0.18.0>
* Add a new toggle file /etc/docker/suse-secrets-enable which allows users to
disable the SUSEConnect integration with Docker (which creates special
mounts in /run/secrets to allow container-suseconnect to authenticate
containers with registries on registered hosts). bsc#1231348 bsc#1232999
In order to disable these mounts, just do
echo 0 > /etc/docker/suse-secrets-enable
and restart Docker. In order to re-enable them, just do
echo 1 > /etc/docker/suse-secrets-enable
and restart Docker. Docker will output information on startup to tell you
whether the SUSE secrets feature is enabled or not.
* Disable docker-buildx builds for SLES. It turns out that build containers
with docker-buildx don't currently get the SUSE secrets mounts applied,
meaning that container-suseconnect doesn't work when building images.
bsc#1233819
* Remove DOCKER_NETWORK_OPTS from docker.service. This was removed from
sysconfig a long time ago, and apparently this causes issues with systemd in
some cases.
* Allow a parallel docker-stable RPM to exists in repositories.
* Update to docker-buildx v0.17.1 to match standalone docker-buildx package we
are replacing. See upstream changelog online at
<https://github.com/docker/buildx/releases/tag/v0.17.1>
* Allow users to disable SUSE secrets support by setting
DOCKER_SUSE_SECRETS_ENABLE=0 in /etc/sysconfig/docker. (bsc#1231348)
* Mark docker-buildx as required since classic "docker build" has been
deprecated since Docker 23.0. (bsc#1230331)
* Import docker-buildx v0.16.2 as a subpackage. Previously this was a separate
package, but with docker-stable it will be necessary to maintain the
packages together and it makes more sense to have them live in the same OBS
package. (bsc#1230333)
* Update to Docker 26.1.5-ce. See upstream changelog online at
<https://docs.docker.com/engine/release-notes/26.1/#2615> bsc#1230294
* This update includes fixes for:
* CVE-2024-41110. bsc#1228324
* CVE-2023-47108. bsc#1217070 bsc#1229806
* CVE-2023-45142. bsc#1228553 bsc#1229806
* Update to Docker 26.1.4-ce. See upstream changelog online at
<https://docs.docker.com/engine/release-notes/26.1/#2614>
* Update to Docker 26.1.0-ce. See upstream changelog online at
<https://docs.docker.com/engine/release-notes/26.1/#2610>
* Update --add-runtime to point to correct binary path.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4360=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4360=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4360=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4360=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4360=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4360=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4360=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4360=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-4360=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-4360=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4360=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4360=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4360=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4360=1
* SUSE Linux Enterprise Server 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4360=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4360=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4360=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4360=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4360=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4360=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4360=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-4360=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4360=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4360=1
## Package List:
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* openSUSE Leap 15.5 (noarch)
* docker-rootless-extras-26.1.5_ce-150000.212.1
* docker-fish-completion-26.1.5_ce-150000.212.1
* docker-bash-completion-26.1.5_ce-150000.212.1
* docker-zsh-completion-26.1.5_ce-150000.212.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* openSUSE Leap 15.6 (noarch)
* docker-rootless-extras-26.1.5_ce-150000.212.1
* docker-fish-completion-26.1.5_ce-150000.212.1
* docker-bash-completion-26.1.5_ce-150000.212.1
* docker-zsh-completion-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* Containers Module 15-SP5 (noarch)
* docker-rootless-extras-26.1.5_ce-150000.212.1
* docker-bash-completion-26.1.5_ce-150000.212.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* Containers Module 15-SP6 (noarch)
* docker-rootless-extras-26.1.5_ce-150000.212.1
* docker-bash-completion-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (aarch64
x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch)
* docker-bash-completion-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* docker-fish-completion-26.1.5_ce-150000.212.1
* docker-bash-completion-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* docker-rootless-extras-26.1.5_ce-150000.212.1
* docker-bash-completion-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* docker-rootless-extras-26.1.5_ce-150000.212.1
* docker-bash-completion-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 ppc64le s390x x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (noarch)
* docker-bash-completion-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* docker-fish-completion-26.1.5_ce-150000.212.1
* docker-bash-completion-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* docker-rootless-extras-26.1.5_ce-150000.212.1
* docker-bash-completion-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* docker-bash-completion-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* docker-fish-completion-26.1.5_ce-150000.212.1
* docker-bash-completion-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* docker-rootless-extras-26.1.5_ce-150000.212.1
* docker-bash-completion-26.1.5_ce-150000.212.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Enterprise Storage 7.1 (noarch)
* docker-fish-completion-26.1.5_ce-150000.212.1
* docker-bash-completion-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* docker-26.1.5_ce-150000.212.1
* docker-debuginfo-26.1.5_ce-150000.212.1
## References:
* https://www.suse.com/security/cve/CVE-2023-45142.html
* https://www.suse.com/security/cve/CVE-2023-47108.html
* https://www.suse.com/security/cve/CVE-2024-41110.html
* https://bugzilla.suse.com/show_bug.cgi?id=1217070
* https://bugzilla.suse.com/show_bug.cgi?id=1228324
* https://bugzilla.suse.com/show_bug.cgi?id=1228553
* https://bugzilla.suse.com/show_bug.cgi?id=1229806
* https://bugzilla.suse.com/show_bug.cgi?id=1230294
* https://bugzilla.suse.com/show_bug.cgi?id=1230331
* https://bugzilla.suse.com/show_bug.cgi?id=1230333
* https://bugzilla.suse.com/show_bug.cgi?id=1231348
* https://bugzilla.suse.com/show_bug.cgi?id=1232999
* https://bugzilla.suse.com/show_bug.cgi?id=1233819
1
0
# Recommended update for gdm
Announcement ID: SUSE-RU-2024:4361-1
Release Date: 2024-12-17T15:04:56Z
Rating: moderate
References:
* bsc#1234135
Affected Products:
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for gdm fixes the following issue:
* Re-enable wayland on hybrid graphics laptops with NVIDIA driver
(bsc#1234135).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4361=1 openSUSE-SLE-15.6-2024-4361=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4361=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* gdm-debugsource-45.0.1-150600.6.3.2
* libgdm1-45.0.1-150600.6.3.2
* gdm-devel-45.0.1-150600.6.3.2
* gdm-45.0.1-150600.6.3.2
* gdm-debuginfo-45.0.1-150600.6.3.2
* libgdm1-debuginfo-45.0.1-150600.6.3.2
* typelib-1_0-Gdm-1_0-45.0.1-150600.6.3.2
* openSUSE Leap 15.6 (noarch)
* gdm-lang-45.0.1-150600.6.3.2
* gdm-schema-45.0.1-150600.6.3.2
* gdmflexiserver-45.0.1-150600.6.3.2
* gdm-systemd-45.0.1-150600.6.3.2
* gdm-branding-upstream-45.0.1-150600.6.3.2
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* gdm-debugsource-45.0.1-150600.6.3.2
* libgdm1-45.0.1-150600.6.3.2
* gdm-devel-45.0.1-150600.6.3.2
* gdm-45.0.1-150600.6.3.2
* gdm-debuginfo-45.0.1-150600.6.3.2
* libgdm1-debuginfo-45.0.1-150600.6.3.2
* typelib-1_0-Gdm-1_0-45.0.1-150600.6.3.2
* Desktop Applications Module 15-SP6 (noarch)
* gdm-lang-45.0.1-150600.6.3.2
* gdmflexiserver-45.0.1-150600.6.3.2
* gdm-systemd-45.0.1-150600.6.3.2
* gdm-schema-45.0.1-150600.6.3.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1234135
1
0
17 Dec '24
# Recommended update for hwdata
Announcement ID: SUSE-RU-2024:4363-1
Release Date: 2024-12-17T15:13:59Z
Rating: moderate
References:
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.3
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15
* SUSE Linux Enterprise Desktop 15 SP1
* SUSE Linux Enterprise Desktop 15 SP2
* SUSE Linux Enterprise Desktop 15 SP3
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP1
* SUSE Linux Enterprise Real Time 15 SP2
* SUSE Linux Enterprise Real Time 15 SP3
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Client Tools for SLE 15
* SUSE Manager Proxy 4.3
* SUSE Manager Proxy 4.3 Module
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Manager Server 4.3 Module
An update that can now be installed.
## Description:
This update for hwdata fixes the following issue:
* Version update v0.390
* Update pci and vendor ids
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4363=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4363=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4363=1
* SUSE Manager Client Tools for SLE 15
zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-4363=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4363=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4363=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4363=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4363=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4363=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4363=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4363=1
* SUSE Manager Proxy 4.3 Module
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-4363=1
* SUSE Manager Server 4.3 Module
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-4363=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4363=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4363=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4363=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4363=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4363=1
* SUSE Linux Enterprise Server 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4363=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4363=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4363=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4363=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4363=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4363=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4363=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4363=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4363=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4363=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4363=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4363=1
## Package List:
* openSUSE Leap Micro 5.5 (noarch)
* hwdata-0.390-150000.3.74.2
* openSUSE Leap 15.5 (noarch)
* hwdata-0.390-150000.3.74.2
* openSUSE Leap 15.6 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Manager Client Tools for SLE 15 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise Micro 5.3 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise Micro 5.4 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise Micro 5.5 (noarch)
* hwdata-0.390-150000.3.74.2
* Basesystem Module 15-SP5 (noarch)
* hwdata-0.390-150000.3.74.2
* Basesystem Module 15-SP6 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Manager Proxy 4.3 Module (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Manager Server 4.3 Module (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise Server 15 SP2 LTSS (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Manager Proxy 4.3 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Manager Server 4.3 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Enterprise Storage 7.1 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise Micro 5.2 (noarch)
* hwdata-0.390-150000.3.74.2
* SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
* hwdata-0.390-150000.3.74.2
1
0
17 Dec '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:4346-1
Release Date: 2024-12-17T08:32:55Z
Rating: important
References:
* bsc#1218644
* bsc#1220382
* bsc#1221309
* bsc#1222590
* bsc#1229808
* bsc#1230220
* bsc#1231646
* bsc#1232187
* bsc#1232312
* bsc#1232860
* bsc#1232907
* bsc#1232919
* bsc#1232928
* bsc#1233070
* bsc#1233214
* bsc#1233293
* bsc#1233453
* bsc#1233456
* bsc#1233463
* bsc#1233468
* bsc#1233479
* bsc#1233490
* bsc#1233491
* bsc#1233555
* bsc#1233557
* bsc#1233561
* bsc#1233977
Cross-References:
* CVE-2023-52922
* CVE-2024-26782
* CVE-2024-44932
* CVE-2024-44964
* CVE-2024-47757
* CVE-2024-50017
* CVE-2024-50089
* CVE-2024-50115
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50154
* CVE-2024-50205
* CVE-2024-50259
* CVE-2024-50264
* CVE-2024-50267
* CVE-2024-50274
* CVE-2024-50279
* CVE-2024-50290
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53061
* CVE-2024-53063
* CVE-2024-53068
CVSS scores:
* CVE-2023-52922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44964 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H
* CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47757 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50259 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50259 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves 23 vulnerabilities and has four security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
* CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
* CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft
reset (bsc#1230220).
* CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete()
(bsc#1232187).
* CVE-2024-50089: unicode: Do not special case ignorable code points
(bsc#1232860).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50154: tcp: Fix use-after-free of nreq in reqsk_timer_handler()
(bsc#1233070).
* CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in
apply_constraint_to_size() (bsc#1233293).
* CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in
nsim_nexthop_bucket_activity_write() (bsc#1233214).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50267: USB: serial: io_edgeport: fix use after free in debug printk
(bsc#1233456).
* CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus
(bsc#1233479).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233490).
* CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491).
* CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
* CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access
(bsc#1233557).
* CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in
scmi_bus_notifier() (bsc#1233561).
The following non-security bugs were fixed:
* Update config files (bsc#1218644).
* Update config files. Enabled IDPF for ARM64 (bsc#1221309)
* kernel-binary: Enable livepatch package only when livepatch is enabled
Otherwise the filelist may be empty failing the build (bsc#1218644).
* mm/memory: add non-anonymous page check in the copy_present_page()
(bsc#1231646).
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation. (bsc#1218644)
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4346=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4346=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4346=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4346=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4346=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4346=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4346=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4346=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4346=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.
* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-4346=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4346=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4346=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4346=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4346=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4346=1
## Package List:
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.144.1
* SUSE Manager Proxy 4.3 (x86_64)
* kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1
* kernel-default-debugsource-5.14.21-150400.24.144.1
* kernel-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-devel-5.14.21-150400.24.144.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.144.1
* kernel-syms-5.14.21-150400.24.144.1
* SUSE Manager Proxy 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.144.1
* kernel-macros-5.14.21-150400.24.144.1
* kernel-source-5.14.21-150400.24.144.1
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.144.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1
* kernel-default-debugsource-5.14.21-150400.24.144.1
* kernel-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-devel-5.14.21-150400.24.144.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.144.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.144.1
* kernel-macros-5.14.21-150400.24.144.1
* SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
* kernel-default-5.14.21-150400.24.144.1
* SUSE Manager Server 4.3 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.144.1
* kernel-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-devel-5.14.21-150400.24.144.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.144.1
* kernel-syms-5.14.21-150400.24.144.1
* SUSE Manager Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.144.1
* kernel-macros-5.14.21-150400.24.144.1
* kernel-source-5.14.21-150400.24.144.1
* SUSE Manager Server 4.3 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.144.1
* SUSE Manager Server 4.3 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.144.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.144.1
* openSUSE Leap 15.4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.144.1
* openSUSE Leap 15.4 (noarch)
* kernel-docs-html-5.14.21-150400.24.144.1
* kernel-source-5.14.21-150400.24.144.1
* kernel-devel-5.14.21-150400.24.144.1
* kernel-source-vanilla-5.14.21-150400.24.144.1
* kernel-macros-5.14.21-150400.24.144.1
* openSUSE Leap 15.4 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150400.24.144.1
* openSUSE Leap 15.4 (ppc64le x86_64)
* kernel-debug-devel-debuginfo-5.14.21-150400.24.144.1
* kernel-debug-devel-5.14.21-150400.24.144.1
* kernel-debug-debugsource-5.14.21-150400.24.144.1
* kernel-debug-debuginfo-5.14.21-150400.24.144.1
* openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1
* kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.144.1
* kernel-kvmsmall-devel-5.14.21-150400.24.144.1
* kernel-default-base-rebuild-5.14.21-150400.24.144.1.150400.24.70.1
* kernel-kvmsmall-debuginfo-5.14.21-150400.24.144.1
* kernel-kvmsmall-debugsource-5.14.21-150400.24.144.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-livepatch-5.14.21-150400.24.144.1
* kernel-obs-qa-5.14.21-150400.24.144.1
* kernel-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.144.1
* kernel-default-optional-5.14.21-150400.24.144.1
* kernel-default-extra-5.14.21-150400.24.144.1
* gfs2-kmp-default-5.14.21-150400.24.144.1
* kselftests-kmp-default-debuginfo-5.14.21-150400.24.144.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.144.1
* kernel-obs-build-debugsource-5.14.21-150400.24.144.1
* dlm-kmp-default-5.14.21-150400.24.144.1
* ocfs2-kmp-default-5.14.21-150400.24.144.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.144.1
* kernel-obs-build-5.14.21-150400.24.144.1
* kernel-syms-5.14.21-150400.24.144.1
* kselftests-kmp-default-5.14.21-150400.24.144.1
* reiserfs-kmp-default-5.14.21-150400.24.144.1
* cluster-md-kmp-default-5.14.21-150400.24.144.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.144.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-debugsource-5.14.21-150400.24.144.1
* kernel-default-optional-debuginfo-5.14.21-150400.24.144.1
* kernel-default-devel-5.14.21-150400.24.144.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.144.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150400.24.144.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_144-default-1-150400.9.3.1
* kernel-livepatch-SLE15-SP4_Update_34-debugsource-1-150400.9.3.1
* kernel-default-livepatch-devel-5.14.21-150400.24.144.1
* kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-1-150400.9.3.1
* openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150400.24.144.1
* openSUSE Leap 15.4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.144.1
* openSUSE Leap 15.4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.144.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.144.1
* openSUSE Leap 15.4 (nosrc)
* dtb-aarch64-5.14.21-150400.24.144.1
* openSUSE Leap 15.4 (aarch64)
* dtb-nvidia-5.14.21-150400.24.144.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.144.1
* gfs2-kmp-64kb-5.14.21-150400.24.144.1
* dlm-kmp-64kb-5.14.21-150400.24.144.1
* dtb-apple-5.14.21-150400.24.144.1
* dtb-lg-5.14.21-150400.24.144.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.144.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.144.1
* dtb-renesas-5.14.21-150400.24.144.1
* dtb-arm-5.14.21-150400.24.144.1
* dtb-broadcom-5.14.21-150400.24.144.1
* reiserfs-kmp-64kb-5.14.21-150400.24.144.1
* dtb-amazon-5.14.21-150400.24.144.1
* dtb-qcom-5.14.21-150400.24.144.1
* dtb-altera-5.14.21-150400.24.144.1
* ocfs2-kmp-64kb-5.14.21-150400.24.144.1
* dtb-amd-5.14.21-150400.24.144.1
* dtb-xilinx-5.14.21-150400.24.144.1
* dtb-cavium-5.14.21-150400.24.144.1
* dtb-mediatek-5.14.21-150400.24.144.1
* dlm-kmp-64kb-debuginfo-5.14.21-150400.24.144.1
* kernel-64kb-optional-debuginfo-5.14.21-150400.24.144.1
* kernel-64kb-devel-5.14.21-150400.24.144.1
* dtb-apm-5.14.21-150400.24.144.1
* kernel-64kb-debugsource-5.14.21-150400.24.144.1
* dtb-freescale-5.14.21-150400.24.144.1
* kernel-64kb-extra-5.14.21-150400.24.144.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.144.1
* dtb-exynos-5.14.21-150400.24.144.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.144.1
* dtb-sprd-5.14.21-150400.24.144.1
* dtb-socionext-5.14.21-150400.24.144.1
* dtb-allwinner-5.14.21-150400.24.144.1
* kselftests-kmp-64kb-5.14.21-150400.24.144.1
* kernel-64kb-optional-5.14.21-150400.24.144.1
* dtb-amlogic-5.14.21-150400.24.144.1
* dtb-hisilicon-5.14.21-150400.24.144.1
* dtb-marvell-5.14.21-150400.24.144.1
* dtb-rockchip-5.14.21-150400.24.144.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.144.1
* kernel-64kb-debuginfo-5.14.21-150400.24.144.1
* kernel-64kb-extra-debuginfo-5.14.21-150400.24.144.1
* cluster-md-kmp-64kb-5.14.21-150400.24.144.1
* openSUSE Leap 15.4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-debugsource-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-debugsource-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-debugsource-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-debugsource-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
* kernel-default-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-default-livepatch-5.14.21-150400.24.144.1
* kernel-livepatch-SLE15-SP4_Update_34-debugsource-1-150400.9.3.1
* kernel-default-debugsource-5.14.21-150400.24.144.1
* kernel-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-livepatch-devel-5.14.21-150400.24.144.1
* kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_144-default-1-150400.9.3.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.144.1
* cluster-md-kmp-default-5.14.21-150400.24.144.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.144.1
* gfs2-kmp-default-5.14.21-150400.24.144.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-debugsource-5.14.21-150400.24.144.1
* kernel-default-debuginfo-5.14.21-150400.24.144.1
* dlm-kmp-default-5.14.21-150400.24.144.1
* ocfs2-kmp-default-5.14.21-150400.24.144.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.144.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
* kernel-default-5.14.21-150400.24.144.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.144.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.144.1
* kernel-64kb-debuginfo-5.14.21-150400.24.144.1
* kernel-64kb-devel-5.14.21-150400.24.144.1
* kernel-64kb-debugsource-5.14.21-150400.24.144.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.144.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1
* reiserfs-kmp-default-5.14.21-150400.24.144.1
* kernel-default-debugsource-5.14.21-150400.24.144.1
* kernel-obs-build-debugsource-5.14.21-150400.24.144.1
* kernel-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-devel-5.14.21-150400.24.144.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.144.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.144.1
* kernel-obs-build-5.14.21-150400.24.144.1
* kernel-syms-5.14.21-150400.24.144.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.144.1
* kernel-macros-5.14.21-150400.24.144.1
* kernel-source-5.14.21-150400.24.144.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.144.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.144.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.144.1
* kernel-64kb-debuginfo-5.14.21-150400.24.144.1
* kernel-64kb-devel-5.14.21-150400.24.144.1
* kernel-64kb-debugsource-5.14.21-150400.24.144.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.144.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1
* reiserfs-kmp-default-5.14.21-150400.24.144.1
* kernel-default-debugsource-5.14.21-150400.24.144.1
* kernel-obs-build-debugsource-5.14.21-150400.24.144.1
* kernel-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-devel-5.14.21-150400.24.144.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.144.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.144.1
* kernel-obs-build-5.14.21-150400.24.144.1
* kernel-syms-5.14.21-150400.24.144.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.144.1
* kernel-macros-5.14.21-150400.24.144.1
* kernel-source-5.14.21-150400.24.144.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (nosrc x86_64)
* kernel-default-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1
* kernel-default-debugsource-5.14.21-150400.24.144.1
* kernel-obs-build-debugsource-5.14.21-150400.24.144.1
* kernel-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.144.1
* kernel-default-extra-5.14.21-150400.24.144.1
* kernel-default-devel-5.14.21-150400.24.144.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.144.1
* kernel-obs-build-5.14.21-150400.24.144.1
* kernel-syms-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch)
* kernel-devel-5.14.21-150400.24.144.1
* kernel-macros-5.14.21-150400.24.144.1
* kernel-source-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch nosrc)
* kernel-docs-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.144.1
* kernel-64kb-debuginfo-5.14.21-150400.24.144.1
* kernel-64kb-devel-5.14.21-150400.24.144.1
* kernel-64kb-debugsource-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-5.14.21-150400.24.144.1
* kernel-default-debugsource-5.14.21-150400.24.144.1
* kernel-obs-build-debugsource-5.14.21-150400.24.144.1
* kernel-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-devel-5.14.21-150400.24.144.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.144.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.144.1
* kernel-obs-build-5.14.21-150400.24.144.1
* kernel-syms-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* kernel-devel-5.14.21-150400.24.144.1
* kernel-macros-5.14.21-150400.24.144.1
* kernel-source-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc)
* kernel-docs-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.144.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.144.1.150400.24.70.1
* reiserfs-kmp-default-5.14.21-150400.24.144.1
* kernel-default-debugsource-5.14.21-150400.24.144.1
* kernel-obs-build-debugsource-5.14.21-150400.24.144.1
* kernel-default-debuginfo-5.14.21-150400.24.144.1
* kernel-default-devel-5.14.21-150400.24.144.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.144.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.144.1
* kernel-obs-build-5.14.21-150400.24.144.1
* kernel-syms-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.144.1
* kernel-macros-5.14.21-150400.24.144.1
* kernel-source-5.14.21-150400.24.144.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.144.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52922.html
* https://www.suse.com/security/cve/CVE-2024-26782.html
* https://www.suse.com/security/cve/CVE-2024-44932.html
* https://www.suse.com/security/cve/CVE-2024-44964.html
* https://www.suse.com/security/cve/CVE-2024-47757.html
* https://www.suse.com/security/cve/CVE-2024-50017.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50259.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50274.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53068.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1220382
* https://bugzilla.suse.com/show_bug.cgi?id=1221309
* https://bugzilla.suse.com/show_bug.cgi?id=1222590
* https://bugzilla.suse.com/show_bug.cgi?id=1229808
* https://bugzilla.suse.com/show_bug.cgi?id=1230220
* https://bugzilla.suse.com/show_bug.cgi?id=1231646
* https://bugzilla.suse.com/show_bug.cgi?id=1232187
* https://bugzilla.suse.com/show_bug.cgi?id=1232312
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233214
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233463
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233561
* https://bugzilla.suse.com/show_bug.cgi?id=1233977
1
0
17 Dec '24
# Security update for libsoup2
Announcement ID: SUSE-SU-2024:4349-1
Release Date: 2024-12-17T08:53:04Z
Rating: important
References:
* bsc#1233285
* bsc#1233287
* bsc#1233292
Cross-References:
* CVE-2024-52530
* CVE-2024-52531
* CVE-2024-52532
CVSS scores:
* CVE-2024-52530 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-52530 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-52530 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-52531 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-52531 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-52531 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-52532 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-52532 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-52532 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves three vulnerabilities can now be installed.
## Description:
This update for libsoup2 fixes the following issues:
* CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from
the ends of header names (bsc#1233285)
* CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in
soup_header_parse_param_list_strict (bsc#1233292)
* CVE-2024-52532: Fixed infinite loop while reading websocket data
(bsc#1233287)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4349=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4349=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4349=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4349=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4349=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4349=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4349=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4349=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4349=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4349=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4349=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4349=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4349=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4349=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4349=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4349=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4349=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libsoup2-devel-2.74.2-150400.3.3.1
* libsoup-2_4-1-2.74.2-150400.3.3.1
* typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* openSUSE Leap 15.4 (x86_64)
* libsoup2-devel-32bit-2.74.2-150400.3.3.1
* libsoup-2_4-1-32bit-debuginfo-2.74.2-150400.3.3.1
* libsoup-2_4-1-32bit-2.74.2-150400.3.3.1
* openSUSE Leap 15.4 (noarch)
* libsoup2-lang-2.74.2-150400.3.3.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libsoup-2_4-1-64bit-2.74.2-150400.3.3.1
* libsoup2-devel-64bit-2.74.2-150400.3.3.1
* libsoup-2_4-1-64bit-debuginfo-2.74.2-150400.3.3.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libsoup-2_4-1-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libsoup2-devel-2.74.2-150400.3.3.1
* libsoup-2_4-1-2.74.2-150400.3.3.1
* typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* openSUSE Leap 15.5 (x86_64)
* libsoup2-devel-32bit-2.74.2-150400.3.3.1
* libsoup-2_4-1-32bit-debuginfo-2.74.2-150400.3.3.1
* libsoup-2_4-1-32bit-2.74.2-150400.3.3.1
* openSUSE Leap 15.5 (noarch)
* libsoup2-lang-2.74.2-150400.3.3.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libsoup-2_4-1-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libsoup-2_4-1-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libsoup-2_4-1-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libsoup-2_4-1-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libsoup-2_4-1-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libsoup2-devel-2.74.2-150400.3.3.1
* libsoup-2_4-1-2.74.2-150400.3.3.1
* typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* Basesystem Module 15-SP5 (noarch)
* libsoup2-lang-2.74.2-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libsoup2-devel-2.74.2-150400.3.3.1
* libsoup-2_4-1-2.74.2-150400.3.3.1
* typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* libsoup2-lang-2.74.2-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libsoup2-devel-2.74.2-150400.3.3.1
* libsoup-2_4-1-2.74.2-150400.3.3.1
* typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* libsoup2-lang-2.74.2-150400.3.3.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* libsoup2-devel-2.74.2-150400.3.3.1
* libsoup-2_4-1-2.74.2-150400.3.3.1
* typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch)
* libsoup2-lang-2.74.2-150400.3.3.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libsoup2-devel-2.74.2-150400.3.3.1
* libsoup-2_4-1-2.74.2-150400.3.3.1
* typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* libsoup2-lang-2.74.2-150400.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libsoup2-devel-2.74.2-150400.3.3.1
* libsoup-2_4-1-2.74.2-150400.3.3.1
* typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* libsoup2-lang-2.74.2-150400.3.3.1
* SUSE Manager Proxy 4.3 (x86_64)
* libsoup2-devel-2.74.2-150400.3.3.1
* libsoup-2_4-1-2.74.2-150400.3.3.1
* typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* SUSE Manager Proxy 4.3 (noarch)
* libsoup2-lang-2.74.2-150400.3.3.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libsoup2-devel-2.74.2-150400.3.3.1
* libsoup-2_4-1-2.74.2-150400.3.3.1
* typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* libsoup2-lang-2.74.2-150400.3.3.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libsoup2-devel-2.74.2-150400.3.3.1
* libsoup-2_4-1-2.74.2-150400.3.3.1
* typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.3.1
* libsoup2-debugsource-2.74.2-150400.3.3.1
* SUSE Manager Server 4.3 (noarch)
* libsoup2-lang-2.74.2-150400.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-52530.html
* https://www.suse.com/security/cve/CVE-2024-52531.html
* https://www.suse.com/security/cve/CVE-2024-52532.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233285
* https://bugzilla.suse.com/show_bug.cgi?id=1233287
* https://bugzilla.suse.com/show_bug.cgi?id=1233292
1
0
17 Dec '24
# Security update for libsoup
Announcement ID: SUSE-SU-2024:4352-1
Release Date: 2024-12-17T10:01:45Z
Rating: important
References:
* bsc#1233285
* bsc#1233287
* bsc#1233292
Cross-References:
* CVE-2024-52530
* CVE-2024-52531
* CVE-2024-52532
CVSS scores:
* CVE-2024-52530 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-52530 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-52530 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-52531 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-52531 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-52531 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-52532 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-52532 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-52532 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves three vulnerabilities can now be installed.
## Description:
This update for libsoup fixes the following issues:
* CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from
the ends of header names (bsc#1233285)
* CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in
soup_header_parse_param_list_strict (bsc#1233292)
* CVE-2024-52532: Fixed infinite loop while reading websocket data
(bsc#1233287)
Other fixes:
* websocket-test: disconnect error copy after the test ends
(glgo#GNOME/libsoup#391).
* fix an intermittent test failure (glgo#GNOME/soup#399).
* Increase test timeout on s390x. The http2-body-stream test can be slow and
sometimes times out in our builds.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4352=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4352=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4352=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4352=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4352=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4352=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4352=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4352=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4352=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4352=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4352=1
## Package List:
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1
* libsoup-3_0-0-3.0.4-150400.3.3.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1
* libsoup-debugsource-3.0.4-150400.3.3.1
* libsoup-devel-3.0.4-150400.3.3.1
* SUSE Manager Server 4.3 (noarch)
* libsoup-lang-3.0.4-150400.3.3.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1
* libsoup-3_0-0-3.0.4-150400.3.3.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1
* libsoup-debugsource-3.0.4-150400.3.3.1
* libsoup-devel-3.0.4-150400.3.3.1
* openSUSE Leap 15.4 (x86_64)
* libsoup-3_0-0-32bit-debuginfo-3.0.4-150400.3.3.1
* libsoup-3_0-0-32bit-3.0.4-150400.3.3.1
* libsoup-devel-32bit-3.0.4-150400.3.3.1
* openSUSE Leap 15.4 (noarch)
* libsoup-lang-3.0.4-150400.3.3.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libsoup-3_0-0-64bit-debuginfo-3.0.4-150400.3.3.1
* libsoup-3_0-0-64bit-3.0.4-150400.3.3.1
* libsoup-devel-64bit-3.0.4-150400.3.3.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1
* libsoup-3_0-0-3.0.4-150400.3.3.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1
* libsoup-debugsource-3.0.4-150400.3.3.1
* libsoup-devel-3.0.4-150400.3.3.1
* openSUSE Leap 15.5 (x86_64)
* libsoup-3_0-0-32bit-debuginfo-3.0.4-150400.3.3.1
* libsoup-3_0-0-32bit-3.0.4-150400.3.3.1
* libsoup-devel-32bit-3.0.4-150400.3.3.1
* openSUSE Leap 15.5 (noarch)
* libsoup-lang-3.0.4-150400.3.3.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1
* libsoup-3_0-0-3.0.4-150400.3.3.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1
* libsoup-debugsource-3.0.4-150400.3.3.1
* libsoup-devel-3.0.4-150400.3.3.1
* Basesystem Module 15-SP5 (noarch)
* libsoup-lang-3.0.4-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1
* libsoup-3_0-0-3.0.4-150400.3.3.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1
* libsoup-debugsource-3.0.4-150400.3.3.1
* libsoup-devel-3.0.4-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1
* libsoup-3_0-0-3.0.4-150400.3.3.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1
* libsoup-debugsource-3.0.4-150400.3.3.1
* libsoup-devel-3.0.4-150400.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.3.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1
* libsoup-3_0-0-3.0.4-150400.3.3.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1
* libsoup-debugsource-3.0.4-150400.3.3.1
* libsoup-devel-3.0.4-150400.3.3.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch)
* libsoup-lang-3.0.4-150400.3.3.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1
* libsoup-3_0-0-3.0.4-150400.3.3.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1
* libsoup-debugsource-3.0.4-150400.3.3.1
* libsoup-devel-3.0.4-150400.3.3.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* libsoup-lang-3.0.4-150400.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1
* libsoup-3_0-0-3.0.4-150400.3.3.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1
* libsoup-debugsource-3.0.4-150400.3.3.1
* libsoup-devel-3.0.4-150400.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.3.1
* SUSE Manager Proxy 4.3 (x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1
* libsoup-3_0-0-3.0.4-150400.3.3.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1
* libsoup-debugsource-3.0.4-150400.3.3.1
* libsoup-devel-3.0.4-150400.3.3.1
* SUSE Manager Proxy 4.3 (noarch)
* libsoup-lang-3.0.4-150400.3.3.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1
* libsoup-3_0-0-3.0.4-150400.3.3.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.3.1
* libsoup-debugsource-3.0.4-150400.3.3.1
* libsoup-devel-3.0.4-150400.3.3.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* libsoup-lang-3.0.4-150400.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-52530.html
* https://www.suse.com/security/cve/CVE-2024-52531.html
* https://www.suse.com/security/cve/CVE-2024-52532.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233285
* https://bugzilla.suse.com/show_bug.cgi?id=1233287
* https://bugzilla.suse.com/show_bug.cgi?id=1233292
1
0
17 Dec '24
# Recommended update for libguestfs
Announcement ID: SUSE-RU-2024:4335-1
Release Date: 2024-12-16T21:49:28Z
Rating: moderate
References:
* bsc#1223444
* jsc#PED-6305
Affected Products:
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that contains one feature and has one fix can now be installed.
## Description:
This update for libguestfs and guestfs-tools fixes the following issues:
* Update to version 1.52.2(jsc#PED-6305, bsc#1223444)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4335=1 openSUSE-SLE-15.6-2024-4335=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-4335=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python3-libguestfs-1.52.2-150600.4.3.3
* python3-libguestfs-debuginfo-1.52.2-150600.4.3.3
* perl-Sys-Guestfs-debuginfo-1.52.2-150600.4.3.3
* libguestfs-gobject-1_0-debuginfo-1.52.2-150600.4.3.3
* libguestfs-typelib-Guestfs-1_0-1.52.2-150600.4.3.3
* rubygem-libguestfs-debuginfo-1.52.2-150600.4.3.3
* libguestfs-xfs-1.52.2-150600.4.3.3
* libguestfs0-debuginfo-1.52.2-150600.4.3.3
* libguestfs-rsync-1.52.2-150600.4.3.3
* libguestfs-debuginfo-1.52.2-150600.4.3.3
* rubygem-libguestfs-1.52.2-150600.4.3.3
* ocaml-libguestfs-devel-1.52.2-150600.4.3.3
* lua-libguestfs-debuginfo-1.52.2-150600.4.3.3
* libguestfs0-1.52.2-150600.4.3.3
* libguestfs-rescue-debuginfo-1.52.2-150600.4.3.3
* libguestfsd-debuginfo-1.52.2-150600.4.3.3
* libguestfs-rescue-1.52.2-150600.4.3.3
* libguestfs-debugsource-1.52.2-150600.4.3.3
* perl-Sys-Guestfs-1.52.2-150600.4.3.3
* libguestfs-winsupport-1.52.2-150600.4.3.3
* libguestfs-1.52.2-150600.4.3.3
* libguestfs-gobject-1_0-1.52.2-150600.4.3.3
* guestfs-tools-1.52.2-150600.4.3.2
* guestfs-tools-debuginfo-1.52.2-150600.4.3.2
* ocaml-libguestfs-devel-debuginfo-1.52.2-150600.4.3.3
* libguestfs-gobject-devel-1.52.2-150600.4.3.3
* lua-libguestfs-1.52.2-150600.4.3.3
* ocaml-libguestfs-1.52.2-150600.4.3.3
* libguestfs-devel-1.52.2-150600.4.3.3
* libguestfs-appliance-1.52.2-150600.4.3.3
* libguestfsd-1.52.2-150600.4.3.3
* guestfs-tools-debugsource-1.52.2-150600.4.3.2
* openSUSE Leap 15.6 (noarch)
* guestfs-tools-man-pages-ja-1.52.2-150600.4.3.2
* libguestfs-inspect-icons-1.52.2-150600.4.3.3
* virt-win-reg-1.52.2-150600.4.3.2
* guestfs-tools-bash-completion-1.52.2-150600.4.3.2
* libguestfs-man-pages-ja-1.52.2-150600.4.3.3
* libguestfs-bash-completion-1.52.2-150600.4.3.3
* libguestfs-man-pages-uk-1.52.2-150600.4.3.3
* guestfs-tools-man-pages-uk-1.52.2-150600.4.3.2
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python3-libguestfs-1.52.2-150600.4.3.3
* python3-libguestfs-debuginfo-1.52.2-150600.4.3.3
* perl-Sys-Guestfs-debuginfo-1.52.2-150600.4.3.3
* libguestfs-gobject-1_0-debuginfo-1.52.2-150600.4.3.3
* libguestfs-typelib-Guestfs-1_0-1.52.2-150600.4.3.3
* rubygem-libguestfs-debuginfo-1.52.2-150600.4.3.3
* libguestfs-xfs-1.52.2-150600.4.3.3
* libguestfs0-debuginfo-1.52.2-150600.4.3.3
* libguestfs-rsync-1.52.2-150600.4.3.3
* libguestfs-debuginfo-1.52.2-150600.4.3.3
* rubygem-libguestfs-1.52.2-150600.4.3.3
* lua-libguestfs-debuginfo-1.52.2-150600.4.3.3
* libguestfs0-1.52.2-150600.4.3.3
* libguestfs-rescue-debuginfo-1.52.2-150600.4.3.3
* libguestfsd-debuginfo-1.52.2-150600.4.3.3
* libguestfs-rescue-1.52.2-150600.4.3.3
* libguestfs-debugsource-1.52.2-150600.4.3.3
* perl-Sys-Guestfs-1.52.2-150600.4.3.3
* libguestfs-winsupport-1.52.2-150600.4.3.3
* libguestfs-1.52.2-150600.4.3.3
* libguestfs-gobject-1_0-1.52.2-150600.4.3.3
* guestfs-tools-1.52.2-150600.4.3.2
* guestfs-tools-debuginfo-1.52.2-150600.4.3.2
* libguestfs-gobject-devel-1.52.2-150600.4.3.3
* lua-libguestfs-1.52.2-150600.4.3.3
* ocaml-libguestfs-1.52.2-150600.4.3.3
* libguestfs-devel-1.52.2-150600.4.3.3
* libguestfs-appliance-1.52.2-150600.4.3.3
* libguestfsd-1.52.2-150600.4.3.3
* guestfs-tools-debugsource-1.52.2-150600.4.3.2
* Server Applications Module 15-SP6 (noarch)
* guestfs-tools-man-pages-ja-1.52.2-150600.4.3.2
* libguestfs-inspect-icons-1.52.2-150600.4.3.3
* guestfs-tools-bash-completion-1.52.2-150600.4.3.2
* virt-win-reg-1.52.2-150600.4.3.2
* libguestfs-man-pages-ja-1.52.2-150600.4.3.3
* libguestfs-bash-completion-1.52.2-150600.4.3.3
* libguestfs-man-pages-uk-1.52.2-150600.4.3.3
* guestfs-tools-man-pages-uk-1.52.2-150600.4.3.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1223444
* https://jira.suse.com/browse/PED-6305
1
0
SUSE-RU-2024:4336-1: moderate: Recommended update for python3-wxPython
by OPENSUSE-UPDATES 17 Dec '24
by OPENSUSE-UPDATES 17 Dec '24
17 Dec '24
# Recommended update for python3-wxPython
Announcement ID: SUSE-RU-2024:4336-1
Release Date: 2024-12-17T06:30:38Z
Rating: moderate
References:
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that can now be installed.
## Description:
This update for python3-wxPython fixes the following issues:
* Ensure the provided python3-wxWidgets_API has the version number from the
version of wxGTK3 used
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4336=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4336=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4336=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4336=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4336=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python3-wxPython-4.1.1-150400.13.1
* python3-wxPython-debuginfo-4.1.1-150400.13.1
* python3-wxPython-lang-4.1.1-150400.13.1
* python3-wxPython-debugsource-4.1.1-150400.13.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python3-wxPython-4.1.1-150400.13.1
* python3-wxPython-debuginfo-4.1.1-150400.13.1
* python3-wxPython-lang-4.1.1-150400.13.1
* python3-wxPython-debugsource-4.1.1-150400.13.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python3-wxPython-4.1.1-150400.13.1
* python3-wxPython-debuginfo-4.1.1-150400.13.1
* python3-wxPython-lang-4.1.1-150400.13.1
* python3-wxPython-debugsource-4.1.1-150400.13.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* python3-wxPython-4.1.1-150400.13.1
* python3-wxPython-debuginfo-4.1.1-150400.13.1
* python3-wxPython-debugsource-4.1.1-150400.13.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* python3-wxPython-4.1.1-150400.13.1
* python3-wxPython-debuginfo-4.1.1-150400.13.1
* python3-wxPython-debugsource-4.1.1-150400.13.1
1
0
17 Dec '24
# Recommended update for systemd
Announcement ID: SUSE-RU-2024:4337-1
Release Date: 2024-12-17T07:17:51Z
Rating: important
References:
* bsc#1231048
* bsc#1232844
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that has two fixes can now be installed.
## Description:
This update for systemd fixes the following issues:
* udev: skipping empty udev rules file while collecting the stats
(bsc#1232844)
* Clean up some remnants from when homed was in the experimental sub-package
(bsc#1231048)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4337=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4337=1 openSUSE-SLE-15.6-2024-4337=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4337=1
## Package List:
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* systemd-network-254.20-150600.4.18.2
* systemd-network-debuginfo-254.20-150600.4.18.2
* systemd-debuginfo-254.20-150600.4.18.2
* systemd-debugsource-254.20-150600.4.18.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* systemd-coredump-debuginfo-254.20-150600.4.18.2
* systemd-sysvcompat-254.20-150600.4.18.2
* systemd-coredump-254.20-150600.4.18.2
* systemd-homed-debuginfo-254.20-150600.4.18.2
* systemd-testsuite-debuginfo-254.20-150600.4.18.2
* libsystemd0-254.20-150600.4.18.2
* systemd-mini-container-debuginfo-254.20-150600.4.18.1
* systemd-homed-254.20-150600.4.18.2
* systemd-experimental-debuginfo-254.20-150600.4.18.2
* libsystemd0-mini-254.20-150600.4.18.1
* libsystemd0-debuginfo-254.20-150600.4.18.2
* systemd-devel-254.20-150600.4.18.2
* systemd-254.20-150600.4.18.2
* systemd-network-254.20-150600.4.18.2
* libudev-mini1-debuginfo-254.20-150600.4.18.1
* systemd-mini-254.20-150600.4.18.1
* systemd-network-debuginfo-254.20-150600.4.18.2
* systemd-sysvcompat-debuginfo-254.20-150600.4.18.2
* libsystemd0-mini-debuginfo-254.20-150600.4.18.1
* libudev-mini1-254.20-150600.4.18.1
* systemd-journal-remote-254.20-150600.4.18.2
* systemd-portable-debuginfo-254.20-150600.4.18.2
* udev-debuginfo-254.20-150600.4.18.2
* systemd-journal-remote-debuginfo-254.20-150600.4.18.2
* systemd-container-debuginfo-254.20-150600.4.18.2
* systemd-container-254.20-150600.4.18.2
* udev-mini-254.20-150600.4.18.1
* udev-254.20-150600.4.18.2
* systemd-doc-254.20-150600.4.18.2
* systemd-debugsource-254.20-150600.4.18.2
* systemd-portable-254.20-150600.4.18.2
* systemd-testsuite-254.20-150600.4.18.2
* udev-mini-debuginfo-254.20-150600.4.18.1
* systemd-mini-debuginfo-254.20-150600.4.18.1
* systemd-experimental-254.20-150600.4.18.2
* systemd-mini-container-254.20-150600.4.18.1
* systemd-mini-debugsource-254.20-150600.4.18.1
* libudev1-debuginfo-254.20-150600.4.18.2
* libudev1-254.20-150600.4.18.2
* systemd-mini-devel-254.20-150600.4.18.1
* systemd-debuginfo-254.20-150600.4.18.2
* openSUSE Leap 15.6 (x86_64)
* libsystemd0-32bit-254.20-150600.4.18.2
* libsystemd0-32bit-debuginfo-254.20-150600.4.18.2
* systemd-32bit-debuginfo-254.20-150600.4.18.2
* systemd-32bit-254.20-150600.4.18.2
* libudev1-32bit-254.20-150600.4.18.2
* libudev1-32bit-debuginfo-254.20-150600.4.18.2
* systemd-devel-32bit-254.20-150600.4.18.2
* openSUSE Leap 15.6 (aarch64 x86_64 i586)
* systemd-boot-254.20-150600.4.18.2
* systemd-boot-debuginfo-254.20-150600.4.18.2
* openSUSE Leap 15.6 (noarch)
* systemd-lang-254.20-150600.4.18.2
* openSUSE Leap 15.6 (aarch64_ilp32)
* libsystemd0-64bit-254.20-150600.4.18.2
* libsystemd0-64bit-debuginfo-254.20-150600.4.18.2
* systemd-64bit-254.20-150600.4.18.2
* systemd-devel-64bit-254.20-150600.4.18.2
* libudev1-64bit-debuginfo-254.20-150600.4.18.2
* systemd-64bit-debuginfo-254.20-150600.4.18.2
* libudev1-64bit-254.20-150600.4.18.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* systemd-coredump-debuginfo-254.20-150600.4.18.2
* systemd-sysvcompat-254.20-150600.4.18.2
* systemd-doc-254.20-150600.4.18.2
* systemd-coredump-254.20-150600.4.18.2
* systemd-debugsource-254.20-150600.4.18.2
* systemd-devel-254.20-150600.4.18.2
* systemd-sysvcompat-debuginfo-254.20-150600.4.18.2
* systemd-254.20-150600.4.18.2
* libsystemd0-254.20-150600.4.18.2
* systemd-journal-remote-254.20-150600.4.18.2
* libudev1-debuginfo-254.20-150600.4.18.2
* libudev1-254.20-150600.4.18.2
* systemd-debuginfo-254.20-150600.4.18.2
* udev-debuginfo-254.20-150600.4.18.2
* systemd-container-debuginfo-254.20-150600.4.18.2
* systemd-container-254.20-150600.4.18.2
* udev-254.20-150600.4.18.2
* libsystemd0-debuginfo-254.20-150600.4.18.2
* Basesystem Module 15-SP6 (noarch)
* systemd-lang-254.20-150600.4.18.2
* Basesystem Module 15-SP6 (x86_64)
* libsystemd0-32bit-254.20-150600.4.18.2
* libsystemd0-32bit-debuginfo-254.20-150600.4.18.2
* systemd-32bit-debuginfo-254.20-150600.4.18.2
* systemd-32bit-254.20-150600.4.18.2
* libudev1-32bit-254.20-150600.4.18.2
* libudev1-32bit-debuginfo-254.20-150600.4.18.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1231048
* https://bugzilla.suse.com/show_bug.cgi?id=1232844
1
0
17 Dec '24
# Recommended update for systemd
Announcement ID: SUSE-RU-2024:4338-1
Release Date: 2024-12-17T07:19:27Z
Rating: important
References:
* bsc#1230272
* bsc#1231610
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5
An update that has two fixes can now be installed.
## Description:
This update for systemd fixes the following issues:
* core/unit: increase the NameOwnerChanged/GetNameOwner timeout to the unit's
start timeout (bsc#1230272)
* core/unit: add get_timeout_start_usec in UnitVTable and define it for
service
* sd-bus: make bus_add_match_full accept timeout
* udev-builtin-path_id: SAS wide ports must have num_phys > 1 (bsc#1231610)
* sd-device: add helper to read a unsigned int attribute
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4338=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4338=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4338=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4338=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4338=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4338=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4338=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4338=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4338=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4338=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4338=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4338=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4338=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4338=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4338=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4338=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4338=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4338=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* systemd-testsuite-debuginfo-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-mini-debugsource-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* systemd-mini-249.17-150400.8.46.1
* nss-systemd-249.17-150400.8.46.1
* systemd-journal-remote-249.17-150400.8.46.1
* systemd-portable-debuginfo-249.17-150400.8.46.1
* systemd-mini-sysvinit-249.17-150400.8.46.1
* systemd-doc-249.17-150400.8.46.1
* libsystemd0-mini-249.17-150400.8.46.1
* udev-mini-debuginfo-249.17-150400.8.46.1
* nss-systemd-debuginfo-249.17-150400.8.46.1
* systemd-mini-debuginfo-249.17-150400.8.46.1
* nss-myhostname-249.17-150400.8.46.1
* systemd-portable-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* systemd-mini-container-debuginfo-249.17-150400.8.46.1
* systemd-experimental-249.17-150400.8.46.1
* systemd-journal-remote-debuginfo-249.17-150400.8.46.1
* libsystemd0-mini-debuginfo-249.17-150400.8.46.1
* systemd-network-debuginfo-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* systemd-coredump-249.17-150400.8.46.1
* systemd-network-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* systemd-mini-container-249.17-150400.8.46.1
* libudev-mini1-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* systemd-coredump-debuginfo-249.17-150400.8.46.1
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* systemd-testsuite-249.17-150400.8.46.1
* systemd-mini-devel-249.17-150400.8.46.1
* systemd-mini-doc-249.17-150400.8.46.1
* nss-myhostname-debuginfo-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-devel-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* systemd-experimental-debuginfo-249.17-150400.8.46.1
* udev-mini-249.17-150400.8.46.1
* libudev-mini1-debuginfo-249.17-150400.8.46.1
* openSUSE Leap 15.4 (x86_64)
* libudev1-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.46.1
* systemd-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-249.17-150400.8.46.1
* nss-myhostname-32bit-249.17-150400.8.46.1
* libudev1-32bit-debuginfo-249.17-150400.8.46.1
* nss-myhostname-32bit-debuginfo-249.17-150400.8.46.1
* systemd-32bit-debuginfo-249.17-150400.8.46.1
* openSUSE Leap 15.4 (noarch)
* systemd-lang-249.17-150400.8.46.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libsystemd0-64bit-debuginfo-249.17-150400.8.46.1
* systemd-64bit-debuginfo-249.17-150400.8.46.1
* nss-myhostname-64bit-debuginfo-249.17-150400.8.46.1
* libudev1-64bit-debuginfo-249.17-150400.8.46.1
* systemd-64bit-249.17-150400.8.46.1
* libsystemd0-64bit-249.17-150400.8.46.1
* libudev1-64bit-249.17-150400.8.46.1
* nss-myhostname-64bit-249.17-150400.8.46.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-journal-remote-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* systemd-journal-remote-debuginfo-249.17-150400.8.46.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* systemd-testsuite-debuginfo-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* nss-systemd-249.17-150400.8.46.1
* systemd-journal-remote-249.17-150400.8.46.1
* systemd-portable-debuginfo-249.17-150400.8.46.1
* systemd-doc-249.17-150400.8.46.1
* nss-systemd-debuginfo-249.17-150400.8.46.1
* nss-myhostname-249.17-150400.8.46.1
* systemd-portable-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* systemd-experimental-249.17-150400.8.46.1
* systemd-journal-remote-debuginfo-249.17-150400.8.46.1
* systemd-network-debuginfo-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* systemd-coredump-249.17-150400.8.46.1
* systemd-network-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* systemd-coredump-debuginfo-249.17-150400.8.46.1
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* systemd-testsuite-249.17-150400.8.46.1
* nss-myhostname-debuginfo-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-devel-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* systemd-experimental-debuginfo-249.17-150400.8.46.1
* openSUSE Leap 15.5 (x86_64)
* libudev1-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.46.1
* systemd-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-249.17-150400.8.46.1
* nss-myhostname-32bit-249.17-150400.8.46.1
* libudev1-32bit-debuginfo-249.17-150400.8.46.1
* nss-myhostname-32bit-debuginfo-249.17-150400.8.46.1
* systemd-32bit-debuginfo-249.17-150400.8.46.1
* openSUSE Leap 15.5 (noarch)
* systemd-lang-249.17-150400.8.46.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-journal-remote-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* systemd-journal-remote-debuginfo-249.17-150400.8.46.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-journal-remote-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* systemd-journal-remote-debuginfo-249.17-150400.8.46.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-journal-remote-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* systemd-journal-remote-debuginfo-249.17-150400.8.46.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-journal-remote-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* systemd-journal-remote-debuginfo-249.17-150400.8.46.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-journal-remote-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* systemd-journal-remote-debuginfo-249.17-150400.8.46.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* systemd-coredump-debuginfo-249.17-150400.8.46.1
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* systemd-coredump-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-devel-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* systemd-doc-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* Basesystem Module 15-SP5 (noarch)
* systemd-lang-249.17-150400.8.46.1
* Basesystem Module 15-SP5 (x86_64)
* libudev1-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.46.1
* systemd-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-249.17-150400.8.46.1
* libudev1-32bit-debuginfo-249.17-150400.8.46.1
* systemd-32bit-debuginfo-249.17-150400.8.46.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* systemd-network-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* systemd-network-249.17-150400.8.46.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* systemd-coredump-debuginfo-249.17-150400.8.46.1
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* systemd-coredump-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-devel-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* systemd-doc-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* systemd-lang-249.17-150400.8.46.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libudev1-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.46.1
* systemd-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-249.17-150400.8.46.1
* libudev1-32bit-debuginfo-249.17-150400.8.46.1
* systemd-32bit-debuginfo-249.17-150400.8.46.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* systemd-coredump-debuginfo-249.17-150400.8.46.1
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* systemd-coredump-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-devel-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* systemd-doc-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* systemd-lang-249.17-150400.8.46.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libudev1-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.46.1
* systemd-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-249.17-150400.8.46.1
* libudev1-32bit-debuginfo-249.17-150400.8.46.1
* systemd-32bit-debuginfo-249.17-150400.8.46.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* libudev1-32bit-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* systemd-doc-249.17-150400.8.46.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.46.1
* libudev1-32bit-debuginfo-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* systemd-coredump-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* systemd-32bit-debuginfo-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* systemd-coredump-debuginfo-249.17-150400.8.46.1
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-devel-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch)
* systemd-lang-249.17-150400.8.46.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* systemd-coredump-debuginfo-249.17-150400.8.46.1
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* systemd-coredump-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-devel-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* systemd-doc-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* systemd-lang-249.17-150400.8.46.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* libudev1-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.46.1
* systemd-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-249.17-150400.8.46.1
* libudev1-32bit-debuginfo-249.17-150400.8.46.1
* systemd-32bit-debuginfo-249.17-150400.8.46.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* systemd-coredump-debuginfo-249.17-150400.8.46.1
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* systemd-coredump-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-devel-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* systemd-doc-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* systemd-lang-249.17-150400.8.46.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libudev1-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.46.1
* systemd-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-249.17-150400.8.46.1
* libudev1-32bit-debuginfo-249.17-150400.8.46.1
* systemd-32bit-debuginfo-249.17-150400.8.46.1
* SUSE Manager Proxy 4.3 (x86_64)
* libudev1-32bit-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* systemd-doc-249.17-150400.8.46.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.46.1
* libudev1-32bit-debuginfo-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* systemd-coredump-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* systemd-32bit-debuginfo-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* systemd-coredump-debuginfo-249.17-150400.8.46.1
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-devel-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* SUSE Manager Proxy 4.3 (noarch)
* systemd-lang-249.17-150400.8.46.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libudev1-32bit-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* systemd-doc-249.17-150400.8.46.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.46.1
* libudev1-32bit-debuginfo-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* systemd-coredump-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* systemd-32bit-debuginfo-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* systemd-coredump-debuginfo-249.17-150400.8.46.1
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-devel-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* systemd-lang-249.17-150400.8.46.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* systemd-coredump-debuginfo-249.17-150400.8.46.1
* libsystemd0-debuginfo-249.17-150400.8.46.1
* systemd-debuginfo-249.17-150400.8.46.1
* systemd-debugsource-249.17-150400.8.46.1
* libudev1-debuginfo-249.17-150400.8.46.1
* udev-249.17-150400.8.46.1
* systemd-container-249.17-150400.8.46.1
* systemd-coredump-249.17-150400.8.46.1
* libsystemd0-249.17-150400.8.46.1
* systemd-devel-249.17-150400.8.46.1
* systemd-container-debuginfo-249.17-150400.8.46.1
* systemd-249.17-150400.8.46.1
* systemd-doc-249.17-150400.8.46.1
* libudev1-249.17-150400.8.46.1
* systemd-sysvinit-249.17-150400.8.46.1
* udev-debuginfo-249.17-150400.8.46.1
* SUSE Manager Server 4.3 (noarch)
* systemd-lang-249.17-150400.8.46.1
* SUSE Manager Server 4.3 (x86_64)
* libudev1-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.46.1
* systemd-32bit-249.17-150400.8.46.1
* libsystemd0-32bit-249.17-150400.8.46.1
* libudev1-32bit-debuginfo-249.17-150400.8.46.1
* systemd-32bit-debuginfo-249.17-150400.8.46.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230272
* https://bugzilla.suse.com/show_bug.cgi?id=1231610
1
0
17 Dec '24
# Recommended update for libzypp
Announcement ID: SUSE-RU-2024:4339-1
Release Date: 2024-12-17T07:20:11Z
Rating: moderate
References:
* bsc#1234304
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for libzypp fixes the following issues:
* Url query part: `=` is a safe char in value (bsc#1234304)
* RpmDb: Recognize rpmdb.sqlite as database file
* cmake: check location of fcgi header and adjust include accordingly. On
Debian and derivatives the fcgi headers are not stored in a fastcgi/
subdirectory
## Special Instructions and Notes:
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4339=1 openSUSE-SLE-15.6-2024-4339=1
* SUSE Linux Enterprise High Performance Computing 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-4339=1
* SUSE Linux Enterprise Server 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-4339=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-4339=1
* SUSE Linux Enterprise Desktop 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-4339=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4339=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libzypp-debuginfo-17.35.15-150600.3.35.1
* libzypp-debugsource-17.35.15-150600.3.35.1
* libzypp-17.35.15-150600.3.35.1
* libzypp-devel-doc-17.35.15-150600.3.35.1
* libzypp-devel-17.35.15-150600.3.35.1
* SUSE Linux Enterprise High Performance Computing 15 SP6 (aarch64 x86_64)
* libzypp-17.35.15-150600.3.35.1
* SUSE Linux Enterprise Server 15 SP6 (aarch64 ppc64le s390x x86_64)
* libzypp-17.35.15-150600.3.35.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libzypp-17.35.15-150600.3.35.1
* SUSE Linux Enterprise Desktop 15 SP6 (x86_64)
* libzypp-17.35.15-150600.3.35.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libzypp-debuginfo-17.35.15-150600.3.35.1
* libzypp-debugsource-17.35.15-150600.3.35.1
* libzypp-devel-17.35.15-150600.3.35.1
* libzypp-17.35.15-150600.3.35.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1234304
1
0
17 Dec '24
# Recommended update for libzypp
Announcement ID: SUSE-RU-2024:4340-1
Release Date: 2024-12-17T07:21:09Z
Rating: moderate
References:
* bsc#1234304
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for libzypp fixes the following issues:
* Url query part: `=` is a safe char in value (bsc#1234304)
* RpmDb: Recognize rpmdb.sqlite as database file
* cmake: check location of fcgi header and adjust include accordingly. On
Debian and derivatives the fcgi headers are not stored in a fastcgi/
subdirectory
## Special Instructions and Notes:
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4340=1 SUSE-
SLE-INSTALLER-15-SP4-2024-4340=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4340=1
* SUSE Linux Enterprise High Performance Computing 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-4340=1
* SUSE Linux Enterprise Server 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-4340=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4340=1 SUSE-SLE-
INSTALLER-15-SP4-2024-4340=1
* SUSE Linux Enterprise Desktop 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-4340=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-4340=1 SUSE-SLE-Product-SUSE-
Manager-Retail-Branch-Server-4.3-2024-4340=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4340=1 SUSE-
SLE-INSTALLER-15-SP4-2024-4340=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4340=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4340=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4340=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4340=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4340=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4340=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4340=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4340=1
## Package List:
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libzypp-devel-17.35.15-150400.3.101.1
* libzypp-17.35.15-150400.3.101.1
* libzypp-debugsource-17.35.15-150400.3.101.1
* libzypp-debuginfo-17.35.15-150400.3.101.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libzypp-debugsource-17.35.15-150400.3.101.1
* libzypp-17.35.15-150400.3.101.1
* libzypp-debuginfo-17.35.15-150400.3.101.1
* libzypp-devel-doc-17.35.15-150400.3.101.1
* libzypp-devel-17.35.15-150400.3.101.1
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64)
* libzypp-17.35.15-150400.3.101.1
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64)
* libzypp-17.35.15-150400.3.101.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libzypp-devel-17.35.15-150400.3.101.1
* libzypp-17.35.15-150400.3.101.1
* libzypp-debugsource-17.35.15-150400.3.101.1
* libzypp-debuginfo-17.35.15-150400.3.101.1
* SUSE Linux Enterprise Desktop 15 SP4 (x86_64)
* libzypp-17.35.15-150400.3.101.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libzypp-devel-17.35.15-150400.3.101.1
* libzypp-17.35.15-150400.3.101.1
* libzypp-debugsource-17.35.15-150400.3.101.1
* libzypp-debuginfo-17.35.15-150400.3.101.1
* SUSE Manager Proxy 4.3 (x86_64)
* libzypp-devel-17.35.15-150400.3.101.1
* libzypp-17.35.15-150400.3.101.1
* libzypp-debugsource-17.35.15-150400.3.101.1
* libzypp-debuginfo-17.35.15-150400.3.101.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libzypp-17.35.15-150400.3.101.1
* libzypp-debugsource-17.35.15-150400.3.101.1
* libzypp-debuginfo-17.35.15-150400.3.101.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libzypp-17.35.15-150400.3.101.1
* libzypp-debugsource-17.35.15-150400.3.101.1
* libzypp-debuginfo-17.35.15-150400.3.101.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libzypp-17.35.15-150400.3.101.1
* libzypp-debugsource-17.35.15-150400.3.101.1
* libzypp-debuginfo-17.35.15-150400.3.101.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libzypp-17.35.15-150400.3.101.1
* libzypp-debugsource-17.35.15-150400.3.101.1
* libzypp-debuginfo-17.35.15-150400.3.101.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libzypp-devel-17.35.15-150400.3.101.1
* libzypp-17.35.15-150400.3.101.1
* libzypp-debugsource-17.35.15-150400.3.101.1
* libzypp-debuginfo-17.35.15-150400.3.101.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libzypp-devel-17.35.15-150400.3.101.1
* libzypp-17.35.15-150400.3.101.1
* libzypp-debugsource-17.35.15-150400.3.101.1
* libzypp-debuginfo-17.35.15-150400.3.101.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* libzypp-devel-17.35.15-150400.3.101.1
* libzypp-17.35.15-150400.3.101.1
* libzypp-debugsource-17.35.15-150400.3.101.1
* libzypp-debuginfo-17.35.15-150400.3.101.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libzypp-devel-17.35.15-150400.3.101.1
* libzypp-17.35.15-150400.3.101.1
* libzypp-debugsource-17.35.15-150400.3.101.1
* libzypp-debuginfo-17.35.15-150400.3.101.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1234304
1
0
17 Dec '24
# Recommended update for libzypp
Announcement ID: SUSE-RU-2024:4343-1
Release Date: 2024-12-17T07:23:28Z
Rating: moderate
References:
* bsc#1234304
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for libzypp fixes the following issues:
* Url query part: `=` is a safe char in value (bsc#1234304)
* RpmDb: Recognize rpmdb.sqlite as database file
* cmake: check location of fcgi header and adjust include accordingly. On
Debian and derivatives the fcgi headers are not stored in a fastcgi/
subdirectory
## Special Instructions and Notes:
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4343=1 SUSE-2024-4343=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4343=1
* SUSE Linux Enterprise High Performance Computing 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-4343=1
* SUSE Linux Enterprise Server 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-4343=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-4343=1
* SUSE Linux Enterprise Desktop 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-4343=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4343=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4343=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libzypp-devel-doc-17.35.15-150500.6.27.1
* libzypp-devel-17.35.15-150500.6.27.1
* libzypp-17.35.15-150500.6.27.1
* libzypp-debuginfo-17.35.15-150500.6.27.1
* libzypp-debugsource-17.35.15-150500.6.27.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libzypp-debuginfo-17.35.15-150500.6.27.1
* libzypp-17.35.15-150500.6.27.1
* libzypp-debugsource-17.35.15-150500.6.27.1
* SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64)
* libzypp-17.35.15-150500.6.27.1
* SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64)
* libzypp-17.35.15-150500.6.27.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libzypp-17.35.15-150500.6.27.1
* SUSE Linux Enterprise Desktop 15 SP5 (x86_64)
* libzypp-17.35.15-150500.6.27.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libzypp-debuginfo-17.35.15-150500.6.27.1
* libzypp-17.35.15-150500.6.27.1
* libzypp-debugsource-17.35.15-150500.6.27.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libzypp-devel-17.35.15-150500.6.27.1
* libzypp-debuginfo-17.35.15-150500.6.27.1
* libzypp-17.35.15-150500.6.27.1
* libzypp-debugsource-17.35.15-150500.6.27.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1234304
1
0
16 Dec '24
# Security update for libaom, libyuv
Announcement ID: SUSE-SU-2024:4333-1
Release Date: 2024-12-16T16:43:25Z
Rating: moderate
References:
* jsc#PED-11042
* jsc#PED-11100
Cross-References:
* CVE-2023-6879
CVSS scores:
* CVE-2023-6879 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-6879 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability and contains two features can now be
installed.
## Description:
This update for libaom, libyuv fixes the following issues:
libaom was updated to version 3.7.1:
* Bug Fixes:
* aomedia:3349: heap overflow when increasing resolution
* aomedia:3478: GCC 12.2.0 emits a -Wstringop-overflow warning on aom/av1/encoder/motion_search_facade.c
* aomedia:3489: Detect encoder and image high bit depth mismatch
* aomedia:3491: heap-buffer-overflow on frame size change
* b/303023614: Segfault at encoding time for high bit depth images
* New upstream release 3.7.0
* New Features
* New codec controls:
* AV1E_SET_QUANTIZER_ONE_PASS: Set quantizer for each frame.
* AV1E_ENABLE_RATE_GUIDE_DELTAQ: enable the rate distribution guided delta quantization in all intra mode. The "enable-rate-guide-deltaq" option is added for this control.
* AV1E_SET_RATE_DISTRIBUTION_INFO: set the input file for rate distribution used in all intra mode. The "rate-distribution-info" option is added for this control.
* AV1E_GET_LUMA_CDEF_STRENGTH
* AV1E_SET_BITRATE_ONE_PASS_CBR
* AOM_SCALING_MODE is extended to include 2/3 and 1/3 scaling.
* aom_tune_metric is extended to include AOM_TUNE_VMAF_SALIENCY_MAP. The "tune" option is extended to include "vmaf_saliency_map".
* SVC example encoder svc_encoder_rtc is able to use the rate control library.
* Loopfilter level and CDEF filter level is supported by RTC rate control library.
* New speed (--cpu-used) 11, intended for RTC screen sharing, added for faster encoding with ~3% bdrate loss with 16% IC (instruction count) speedup compared to speed 10.
* Compression Efficiency Improvements
* Improved VoD encoding performance
* 0.1-0.6% BDrate gains for encoding speeds 2 to 6
* Rate control accuracy improvement in VBR mode
* RTC encoding improvements
* Screen content mode: 10-19% BDrate gains for speeds 6 - 10
* Temporal layers video mode, for speed 10:
* 2 temporal layers on low resolutions: 13-15% BDrate gain
* 3 temporal layers on VGA/HD: 3-4% BDrate gain
* Perceptual Quality Improvements
* Fixed multiple block and color artifacts for RTC screen content by
* Incorporating color into RD cost for IDTX
* Reducing thresholds for palette mode in non RD mode
* Allowing more palette mode testing
* Improved color sensitivity for altref in non-RD mode.
* Reduced video flickering for temporal layer encoding.
* Speedup and Memory Optimizations
* Speed up the VoD encoder
* 2-5% for encoding speed 2 to 4
* 9-15% for encoding speed 5 to 6
* ARM
* Standard bitdepth
* speed 5: +31%
* speed 4: +2%
* speed 3: +9%
* speed 2: +157%
* High bitdepth
* speed 5: +85%
* RTC speedups
* Screen content mode
* 15% IC speedup for speeds 6-8
* ARM: 7% for speed 9, 3% for speed 10
* Temporal layers video mode
* 7% speedup for 3 temporal layers on VGA/HD, for speed 10
* Single layer video
* x86: 2% IC speedup for speeds 7-10
* ARM: 2-4% speedup across speeds 5-10
* Bug Fixes
* aomedia:3261 Assertion failed when encoding av1 with film grain and '\--monochrome' flag
* aomedia:3276 ensure all allocations are checked (partial fix)
* aomedia:3451 The libaom library calls exit()
* aomedia:3450 enable -Wshadow for C++ sources
* aomedia:3449 Test Seg Faults After b459af3e345be402db052a143fcc5383d4b74cbd
* aomedia:3416 prune unused symbols / restrict symbol visibility
* aomedia:3443 Jenkins failure: UninstantiatedParameterizedTestSuite<EstimateNoiseTest>
* aomedia:3434 realtime failures with CONFIG_BITSTREAM_DEBUG=1
* aomedia:3433 DeltaqModeTest crash w/row_mt=0
* aomedia:3429 Encoder crash when turn on both ExternalResize and g_threads > 2
* aomedia:3438 Build failure with `-DSANITIZE=address -DBUILD_SHARED_LIBS=ON` when using clang.
* aomedia:3435 Block artifacts when scrolling with AV1 in screen sharing scenarios
* aomedia:3170 vmaf tune presets produce extreme glitches in one scene
* aomedia:3401 Building shared libaom with MSVC results in a race condition with the export library
* aomedia:3420 Floating point exception in av1_tpl_get_frame_importance()
* aomedia:3424 heap-buffer-overflow in ScaleFilterCols_16_C() (SIGABRT)
* aomedia:3417 examples/svc_encoder_rtc.c is using internal macros and functions
* aomedia:3372 SEGV in assign_frame_buffer_p av1_common_int.h
* aomedia:3130 'cpu-features.h' file not found on Android NDK 22
* aomedia:3415 Encoder/decoder mismatch for svc_encoder_rtc running 1 SL 3 TL
* aomedia:3412 Lossless Mode Fails Loopback Bit Test
* aomedia:3409 The use of AV1_VAR_OFFS in av1/encoder/var_based_part.c is incorrect for high bit depths
* aomedia:3403 test_libaom fails with error message "feenableexcept() failed" on Linux arm
* aomedia:3370 Random color block at fast motion area
* aomedia:3393 Assertion failure in av1_convolve_2d_sr_c()
* aomedia:3392 Strong artifacting for high bit-depth real-time
* aomedia:3376 aomenc --threads=10 --deltaq-mode=3 crashes after "Allintra: multi-threading of calculating differential contrast"
* aomedia:3380 Crashes and ASan and TSan errors in deltaq-mode=3 multithreading code
* chromium:1410766 heap-buffer-overflow in aom_yv12_copy_v_c
* Cannot set level via AV1E_SET_TARGET_SEQ_LEVEL_IDX
* Encoding failure due to the use of loop restoration with unintended use of lossless mode.
* Signed integer overflow in scan_past_frames
* Signed integer overflow in update_a_sep_sym
* Flickering in AV1 1440p/2160p HDR transcodes
* Fixed artifacts with screen share at encoder speed 10
* Fixed prediction setup for IDTX
* Update to version 3.6.1:
* aomedia:2871: Guard the support of the 7.x and 8.x levels for AV1 under the
CONFIG_CWG_C013 config flag, and only output the 7.x and 8.x levels when
explicitly requested.
* aomedia:3382: Choose sb_size by ppi instead of svc.
* aomedia:3384: Fix fullpel search limits.
* aomedia:3388: Replace left shift of xq_active by multiplication.
* aomedia:3389: Fix MV clamping in av1_mv_pred.
* aomedia:3390: set_ld_layer_depth: cap max_layer_depth to MAX_ARF_LAYERS.
* aomedia:3418: Fix MV clamping in av1_int_pro_motion_estimation.
* aomedia:3429: Move lpf thread data init to lpf_pipeline_mt_init().
* b:266719111: Fix undefined behavior in Arm Neon code.
* b:269840681: nonrd_opt: align scan tables.
* rtc: Fix is_key_frame setting in variance partition.
* Build: Fix build with clang-cl and Visual Studio.
* Update to version 3.6.0:
* This release includes compression efficiency and perceptual quality
improvements, speedup and memory optimizations, and some new features. This
release is ABI compatible with the last release.
* New Features:
* New values 20-27 (corresponding to levels 7.0-7.3 and 8.0-8.3) for the encoder control AV1E_SET_TARGET_SEQ_LEVEL_IDX (note that the proposal to add the new levels are still in draft status). The original special value 24 (keep level stats only for level monitoring) is renumbered as 32.
* New encoder control AV1E_SET_SKIP_POSTPROC_FILTERING to skip the application of post-processing filters on reconstructed frame in all intra mode.
* New encoder option "kf-max-pyr-height": Maximum height of pyramid structure used for the GOP starting with a key frame (-1 to 5).
* Make SVC work for screen content.
* Rate control improvements to reduce frame-size spikes for screen content coding.
* RISC-V architecture support with gcc toolchain.
* Compression Efficiency Improvements:
* Peak compression efficiency in VOD setting is improved by 1%.
* 0.7% - 2.2% RTC encoding BDrate gains for real time speed 8 to 10.
* 15% RTC encoding BDrate gains for screen content speed 10.
* Perceptual Quality Improvements:
* Resolved a visual quality issue that was reported for high resolution clips (2K) for speed 4 and above in VOD use case.
* Visual quality improvements to screen content coding.
* Quality improvements to temporal layer RTC coding.
* Speedup and Memory Optimizations:
* RTC single-thread encoder speedup:
. ~6% instruction count reduction for speed 5 and 6. . ~15% instruction count
reduction for speed 7. . ~10% instruction count reduction for speed 8 to 10
(>=360p resolutions).
* RTC multi-thread encoder speedup (beyond single-thread speedup):
. 5-8% encode time reduction for speed 7 to 10.
* RTC screen-content encoder speedup:
. 11% instruction count reduction for speed 9 and 10 (>=720p resolutions).
* ~5% reduction in heap memory requirements for RTC, speed 6 to 10.
* AVIF:
. 4-5% speedup for speed 9 in still-picture encoding mode. . 3-4% heap memory
reduction in still-picture encoding mode for 360p-720p resolutions with multiple
threads.
* Bug Fixes:
* Added a workaround for an AV1 specification bug which makes TRANSLATION type global motion models unusable.
* Fixed AddressSanitizer global-buffer-overflow errors in av1/encoder/arm/neon/av1_fwd_txfm2d_neon.c.
* Fixed AddressSanitizer heap-buffer-overflow error in av1_wiener_convolve_add_src_neon().
* chromium:1393384 Avoid scene detection on spatial resize.
* aomedia:3308 Remove color artifacts under high motion.
* aomedia:3310 Avoid out of memory failures with Visual Studio 2017, 2019, and 2022 for Win32 x86 builds.
* aomedia:3346 Make SVC work properly for screen content.
* aomedia:3348 Fix a bug where an uninitialized search_site is used.
* aomedia:3365 Work around what seems like a Visual Studio 2022 compiler optimization bug.
* aomedia:3369 Incorrect PSNR values reported by libaom for 12-bit encode.
* Update to version 3.5.0:
* This release is ABI compatible with the last one, including speedup and
memory optimizations, and new APIs and features.
* New Features
* Support for frame parallel encode for larger number of threads. --fp-mt flag is available for all build configurations.
* New codec control AV1E_GET_NUM_OPERATING_POINTS
* Speedup and Memory Optimizations
* Speed-up multithreaded encoding for good quality mode for larger number of threads through frame parallel encoding:
. 30-34% encode time reduction for 1080p, 16 threads, 1x1 tile configuration
(tile_rows x tile_columns) . 18-28% encode time reduction for 1080p, 16 threads,
2x4 tile configuration . 18-20% encode time reduction for 2160p, 32 threads, 2x4
tile configuration \- 16-20% speed-up for speed=6 to 8 in still-picture encoding
mode \- 5-6% heap memory reduction for speed=6 to 10 in real-time encoding mode
\- Improvements to the speed for speed=7, 8 in real-time encoding mode \-
Improvements to the speed for speed=9, 10 in real-time screen encoding mode \-
Optimizations to improve multi-thread efficiency in real-time encoding mode \-
10-15% speed up for SVC with temporal layers \- SIMD optimizations:
. Improve av1_quantize_fp_32x32_neon() 1.05x to 1.24x faster . Add
aom_highbd_quantize_b{,_32x32,_64x64}_adaptive_neon() 3.15x to 5.6x faster than
"C" . Improve av1_quantize_fp_64x64_neon() 1.17x to 1.66x faster . Add
aom_quantize_b_avx2() 1.4x to 1.7x faster than aom_quantize_b_avx() . Add
aom_quantize_b_32x32_avx2() 1.4x to 2.3x faster than aom_quantize_b_32x32_avx()
. Add aom_quantize_b_64x64_avx2() 2.0x to 2.4x faster than
aom_quantize_b_64x64_ssse3() . Add aom_highbd_quantize_b_32x32_avx2() 9.0x to
10.5x faster than aom_highbd_quantize_b_32x32_c() . Add
aom_highbd_quantize_b_64x64_avx2() 7.3x to 9.7x faster than
aom_highbd_quantize_b_64x64_c() . Improve aom_highbd_quantize_b_avx2() 1.07x to
1.20x faster . Improve av1_quantize_fp_avx2() 1.13x to 1.49x faster . Improve
av1_quantize_fp_32x32_avx2() 1.07x to 1.54x faster . Improve
av1_quantize_fp_64x64_avx2() 1.03x to 1.25x faster . Improve
av1_quantize_lp_avx2() 1.07x to 1.16x faster
* Bug fixes including but not limited to
* aomedia:3206 Assert that skip_width > 0 for deconvolve function
* aomedia:3278 row_mt enc: Delay top-right sync when intraBC is enabled
* aomedia:3282 blend_a64_*_neon: fix bus error in armv7
* aomedia:3283 FRAME_PARALLEL: Propagate border size to all cpis
* aomedia:3283 RESIZE_MODE: Fix incorrect strides being used for motion search
* aomedia:3286 rtc-svc: Fix to dynamic_enable spatial layers
* aomedia:3289 rtc-screen: Fix to skipping inter-mode test in nonrd
* aomedia:3289 rtc-screen: Fix for skip newmv on flat blocks
* aomedia:3299 Fix build failure with CONFIG_TUNE_VMAF=1
* aomedia:3296 Fix the conflict --enable-tx-size-search=0 with nonrd mode --enable-tx-size-search will be ignored in non-rd pick mode
* aomedia:3304 Fix off-by-one error of max w/h in validate_config
* aomedia:3306 Do not use pthread_setname_np on GNU/Hurd
* aomedia:3325 row-multithreading produces invalid bitstream in some cases
* chromium:1346938, chromium:1338114
* compiler_flags.cmake: fix flag detection w/cmake 3.17-3.18.2
* tools/*.py: update to python3
* aom_configure.cmake: detect PIE and set CONFIG_PIC
* test/simd_cmp_impl: use explicit types w/CompareSimd*
* rtc: Fix to disable segm for aq-mode=3
* rtc: Fix to color_sensitivity in variance partition
* rtc-screen: Fix bsize in model rd computation for intra chroma
* Fixes to ensure the correct behavior of the encoder algorithms (like segmentation, computation of statistics, etc.)
* Update to version 3.4.0:
* This release includes compression efficiency and perceptual quality
improvements, speedup and memory optimizations, and some new features. There
are no ABI or API breaking changes in this release.
* New Features:
* New --dist-metric flag with "qm-psnr" value to use quantization matrices in the distortion computation for RD search. The default value is "psnr".
* New command line option "\--auto-intra-tools-off=1" to make all-intra encoding faster for high bit rate under "\--deltaq-mode=3" mode.
* New rate control library aom_av1_rc for real-time hardware encoders. Supports CBR for both one spatial layer and SVC.
* New image format AOM_IMG_FMT_NV12 can be used as input to the encoder. The presence of AOM_IMG_FMT_NV12 can be detected at compile time by checking if the macro AOM_HAVE_IMG_FMT_NV12 is defined.
* New codec controls for the encoder:
o AV1E_SET_AUTO_INTRA_TOOLS_OFF. Only in effect if \--deltaq-mode=3. o
AV1E_SET_RTC_EXTERNAL_RC o AV1E_SET_FP_MT. Only supported if libaom is built
with -DCONFIG_FRAME_PARALLEL_ENCODE=1. o AV1E_GET_TARGET_SEQ_LEVEL_IDX
* New key-value pairs for the key-value API:
o --auto-intra-tools-off=0 (default) or 1. Only in effect if \--deltaq-mode=3. o
--strict-level-conformance=0 (default) or 1 o --fp-mt=0 (default) or 1. Only
supported if libaom is built with -DCONFIG_FRAME_PARALLEL_ENCODE=1. \- New
aomenc options (not supported by the key-value API):
o --nv12
* Compression Efficiency Improvements:
* Correctly calculate SSE for high bitdepth in skip mode, 0.2% to 0.6% coding gain.
* RTC at speed 9/10: BD-rate gain of ~4/5%
* RTC screen content coding: many improvements for real-time screen at speed 10 (quality, speedup, and rate control), up to high resolutions (1080p).
* RTC-SVC: fixes to make intra-only frames work for spatial layers.
* RTC-SVC: quality improvements for temporal layers.
* AV1 RT: A new passive rate control strategy for screen content, an average of 7.5% coding gain, with some clips of 20+%. The feature is turned off by default due to higher bit rate variation.
* Perceptual Quality Improvements:
* RTC: Visual quality improvements for high speeds (9/10)
* Improvements in coding quality for all intra mode
* Speedup and Memory Optimizations:
* ~10% speedup in good quality mode encoding.
* ~7% heap memory reduction in good quality encoding mode for speed 5 and 6.
* Ongoing improvements to intra-frame encoding performance on Arm
* Faster encoding speed for "\--deltaq-mode=3" mode.
* ~10% speedup for speed 5/6, ~15% speedup for speed 7/8, and ~10% speedup for speed 9/10 in real time encoding mode
* ~20% heap memory reduction in still-picture encoding mode for 360p-720p resolutions with multiple threads
* ~13% speedup for speed 6 and ~12% speedup for speed 9 in still-picture encoding mode.
* Optimizations to improve multi-thread efficiency for still-picture encoding mode.
* Bug Fixes:
* b/204460717: README.md: replace master with main
* b/210677928: libaom disable_order is surprising for max_reference_frames=3
* b/222461449: -DCONFIG_TUNE_BUTTERAUGLI=1 broken
* b/227207606: write_greyscale writes incorrect chroma in highbd mode
* b/229955363: Integer-overflow in linsolve_wiener
Update to version 3.3.0:
* This release includes compression efficiency and perceptual quality
improvements, speedup and memory optimizations, some new features, and
several bug fixes.
* New Features
* AV1 RT: Introducing CDEF search level 5
* Changed real time speed 4 to behave the same as real time speed 5
* Add --deltaq-strength
* rtc: Allow scene-change and overshoot detection for svc
* rtc: Intra-only frame for svc
* AV1 RT: Option 2 for codec control AV1E_SET_ENABLE_CDEF to disable CDEF on non-ref frames
* New codec controls AV1E_SET_LOOPFILTER_CONTROL and AOME_GET_LOOPFILTER_LEVEL
* Improvements to three pass encoding
* Compression Efficiency Improvements: Overall compression gains: 0.6%
* Perceptual Quality Improvements
* Improves the perceptual quality of high QP encoding for delta-q mode 4
* Auto select noise synthesis level for all intra
* Speedup and Memory Optimizations
* Added many SSE2 optimizations.
* Good quality 2-pass encoder speedups:
o Speed 2: 9% o Speed 3: 12.5% o Speed 4: 8% o Speed 5: 3% o Speed 6: 4%
* Real time mode encoder speedups:
o Speed 5: 2.6% BDRate gain, 4% speedup o Speed 6: 3.5% BDRate gain, 4% speedup
o Speed 9: 1% BDRate gain, 3% speedup o Speed 10: 3% BDRate gain, neutral
speedup
* All intra encoding speedups (AVIF):
o Single thread - speed 6: 8% o Single thread - speed 9: 15% o Multi thread(8) -
speed 6: 14% o Multi thread(8) - speed 9: 34%
* Bug Fixes
* Issue 3163: Segmentation fault when using \--enable-keyframe-filtering=2
* Issue 2436: Integer overflow in av1_warp_affine_c()
* Issue 3226: armv7 build failure due to gcc-11
* Issue 3195: Bug report on libaom (AddressSanitizer: heap-buffer-overflow)
* Issue 3191: Bug report on libaom (AddressSanitizer: SEGV on unknown address)
* Drop libaom-devel Requires from libaom-devel-doc sub-package: We do not need the devel package to be able to read the devel documentation.
libyuv was added new in version 20230517+a377993.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4333=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4333=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4333=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4333=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4333=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4333=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4333=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4333=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4333=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4333=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4333=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libyuv-debugsource-20230517+a377993-150400.9.3.1
* libaom-debugsource-3.7.1-150400.3.9.1
* libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1
* libyuv-devel-20230517+a377993-150400.9.3.1
* libaom3-debuginfo-3.7.1-150400.3.9.1
* libyuv-tools-20230517+a377993-150400.9.3.1
* libyuv0-debuginfo-20230517+a377993-150400.9.3.1
* libaom-devel-3.7.1-150400.3.9.1
* libyuv0-20230517+a377993-150400.9.3.1
* libaom3-3.7.1-150400.3.9.1
* aom-tools-3.7.1-150400.3.9.1
* aom-tools-debuginfo-3.7.1-150400.3.9.1
* openSUSE Leap 15.4 (x86_64)
* libaom3-32bit-debuginfo-3.7.1-150400.3.9.1
* libyuv0-32bit-20230517+a377993-150400.9.3.1
* libaom3-32bit-3.7.1-150400.3.9.1
* libyuv0-32bit-debuginfo-20230517+a377993-150400.9.3.1
* openSUSE Leap 15.4 (noarch)
* libaom-devel-doc-3.7.1-150400.3.9.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libaom3-64bit-3.7.1-150400.3.9.1
* libaom3-64bit-debuginfo-3.7.1-150400.3.9.1
* libyuv0-64bit-debuginfo-20230517+a377993-150400.9.3.1
* libyuv0-64bit-20230517+a377993-150400.9.3.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libyuv-debugsource-20230517+a377993-150400.9.3.1
* libaom-debugsource-3.7.1-150400.3.9.1
* libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1
* libyuv-devel-20230517+a377993-150400.9.3.1
* libaom3-debuginfo-3.7.1-150400.3.9.1
* libyuv-tools-20230517+a377993-150400.9.3.1
* libyuv0-debuginfo-20230517+a377993-150400.9.3.1
* libaom-devel-3.7.1-150400.3.9.1
* libyuv0-20230517+a377993-150400.9.3.1
* libaom3-3.7.1-150400.3.9.1
* aom-tools-3.7.1-150400.3.9.1
* aom-tools-debuginfo-3.7.1-150400.3.9.1
* openSUSE Leap 15.5 (noarch)
* libaom-devel-doc-3.7.1-150400.3.9.1
* openSUSE Leap 15.5 (x86_64)
* libaom3-32bit-debuginfo-3.7.1-150400.3.9.1
* libyuv0-32bit-20230517+a377993-150400.9.3.1
* libaom3-32bit-3.7.1-150400.3.9.1
* libyuv0-32bit-debuginfo-20230517+a377993-150400.9.3.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libyuv-debugsource-20230517+a377993-150400.9.3.1
* libaom-debugsource-3.7.1-150400.3.9.1
* libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1
* libyuv-devel-20230517+a377993-150400.9.3.1
* libaom3-debuginfo-3.7.1-150400.3.9.1
* libyuv-tools-20230517+a377993-150400.9.3.1
* libyuv0-debuginfo-20230517+a377993-150400.9.3.1
* libaom-devel-3.7.1-150400.3.9.1
* libyuv0-20230517+a377993-150400.9.3.1
* libaom3-3.7.1-150400.3.9.1
* aom-tools-3.7.1-150400.3.9.1
* aom-tools-debuginfo-3.7.1-150400.3.9.1
* Basesystem Module 15-SP5 (noarch)
* libaom-devel-doc-3.7.1-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libyuv-debugsource-20230517+a377993-150400.9.3.1
* libaom-debugsource-3.7.1-150400.3.9.1
* libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1
* libyuv-devel-20230517+a377993-150400.9.3.1
* libaom3-debuginfo-3.7.1-150400.3.9.1
* libyuv-tools-20230517+a377993-150400.9.3.1
* libyuv0-debuginfo-20230517+a377993-150400.9.3.1
* libaom-devel-3.7.1-150400.3.9.1
* libyuv0-20230517+a377993-150400.9.3.1
* libaom3-3.7.1-150400.3.9.1
* aom-tools-3.7.1-150400.3.9.1
* aom-tools-debuginfo-3.7.1-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* libaom-devel-doc-3.7.1-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libyuv-debugsource-20230517+a377993-150400.9.3.1
* libaom-debugsource-3.7.1-150400.3.9.1
* libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1
* libyuv-devel-20230517+a377993-150400.9.3.1
* libaom3-debuginfo-3.7.1-150400.3.9.1
* libyuv-tools-20230517+a377993-150400.9.3.1
* libyuv0-debuginfo-20230517+a377993-150400.9.3.1
* libaom-devel-3.7.1-150400.3.9.1
* libyuv0-20230517+a377993-150400.9.3.1
* libaom3-3.7.1-150400.3.9.1
* aom-tools-3.7.1-150400.3.9.1
* aom-tools-debuginfo-3.7.1-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* libaom-devel-doc-3.7.1-150400.3.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* libyuv-debugsource-20230517+a377993-150400.9.3.1
* libaom-debugsource-3.7.1-150400.3.9.1
* libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1
* libyuv-devel-20230517+a377993-150400.9.3.1
* libaom3-debuginfo-3.7.1-150400.3.9.1
* libyuv-tools-20230517+a377993-150400.9.3.1
* libyuv0-debuginfo-20230517+a377993-150400.9.3.1
* libaom-devel-3.7.1-150400.3.9.1
* libyuv0-20230517+a377993-150400.9.3.1
* libaom3-3.7.1-150400.3.9.1
* aom-tools-3.7.1-150400.3.9.1
* aom-tools-debuginfo-3.7.1-150400.3.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch)
* libaom-devel-doc-3.7.1-150400.3.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libyuv-debugsource-20230517+a377993-150400.9.3.1
* libaom-debugsource-3.7.1-150400.3.9.1
* libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1
* libyuv-devel-20230517+a377993-150400.9.3.1
* libaom3-debuginfo-3.7.1-150400.3.9.1
* libyuv-tools-20230517+a377993-150400.9.3.1
* libyuv0-debuginfo-20230517+a377993-150400.9.3.1
* libaom-devel-3.7.1-150400.3.9.1
* libyuv0-20230517+a377993-150400.9.3.1
* libaom3-3.7.1-150400.3.9.1
* aom-tools-3.7.1-150400.3.9.1
* aom-tools-debuginfo-3.7.1-150400.3.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* libaom-devel-doc-3.7.1-150400.3.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64_ilp32)
* libyuv0-64bit-debuginfo-20230517+a377993-150400.9.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libyuv-debugsource-20230517+a377993-150400.9.3.1
* libaom-debugsource-3.7.1-150400.3.9.1
* libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1
* libyuv-devel-20230517+a377993-150400.9.3.1
* libaom3-debuginfo-3.7.1-150400.3.9.1
* libyuv-tools-20230517+a377993-150400.9.3.1
* libyuv0-debuginfo-20230517+a377993-150400.9.3.1
* libaom-devel-3.7.1-150400.3.9.1
* libyuv0-20230517+a377993-150400.9.3.1
* libaom3-3.7.1-150400.3.9.1
* aom-tools-3.7.1-150400.3.9.1
* aom-tools-debuginfo-3.7.1-150400.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* libaom-devel-doc-3.7.1-150400.3.9.1
* SUSE Manager Proxy 4.3 (x86_64)
* libyuv-debugsource-20230517+a377993-150400.9.3.1
* libaom-debugsource-3.7.1-150400.3.9.1
* libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1
* libyuv-devel-20230517+a377993-150400.9.3.1
* libaom3-debuginfo-3.7.1-150400.3.9.1
* libyuv-tools-20230517+a377993-150400.9.3.1
* libyuv0-debuginfo-20230517+a377993-150400.9.3.1
* libaom-devel-3.7.1-150400.3.9.1
* libyuv0-20230517+a377993-150400.9.3.1
* libaom3-3.7.1-150400.3.9.1
* aom-tools-3.7.1-150400.3.9.1
* aom-tools-debuginfo-3.7.1-150400.3.9.1
* SUSE Manager Proxy 4.3 (noarch)
* libaom-devel-doc-3.7.1-150400.3.9.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libyuv-debugsource-20230517+a377993-150400.9.3.1
* libaom-debugsource-3.7.1-150400.3.9.1
* libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1
* libyuv-devel-20230517+a377993-150400.9.3.1
* libaom3-debuginfo-3.7.1-150400.3.9.1
* libyuv-tools-20230517+a377993-150400.9.3.1
* libyuv0-debuginfo-20230517+a377993-150400.9.3.1
* libaom-devel-3.7.1-150400.3.9.1
* libyuv0-20230517+a377993-150400.9.3.1
* libaom3-3.7.1-150400.3.9.1
* aom-tools-3.7.1-150400.3.9.1
* aom-tools-debuginfo-3.7.1-150400.3.9.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* libaom-devel-doc-3.7.1-150400.3.9.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libyuv-debugsource-20230517+a377993-150400.9.3.1
* libaom-debugsource-3.7.1-150400.3.9.1
* libyuv-tools-debuginfo-20230517+a377993-150400.9.3.1
* libyuv-devel-20230517+a377993-150400.9.3.1
* libaom3-debuginfo-3.7.1-150400.3.9.1
* libyuv-tools-20230517+a377993-150400.9.3.1
* libyuv0-debuginfo-20230517+a377993-150400.9.3.1
* libaom-devel-3.7.1-150400.3.9.1
* libyuv0-20230517+a377993-150400.9.3.1
* libaom3-3.7.1-150400.3.9.1
* aom-tools-3.7.1-150400.3.9.1
* aom-tools-debuginfo-3.7.1-150400.3.9.1
* SUSE Manager Server 4.3 (noarch)
* libaom-devel-doc-3.7.1-150400.3.9.1
## References:
* https://www.suse.com/security/cve/CVE-2023-6879.html
* https://jira.suse.com/browse/PED-11042
* https://jira.suse.com/browse/PED-11100
1
0
16 Dec '24
# Recommended update for selinux-policy
Announcement ID: SUSE-RU-2024:4334-1
Release Date: 2024-12-16T18:31:31Z
Rating: moderate
References:
* bsc#1216052
* bsc#1232496
* bsc#1233789
Affected Products:
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Micro 5.5
An update that has three fixes can now be installed.
## Description:
This update for selinux-policy fixes the following issues:
* Remove enforcing=1 parameter from kernel command line if the system is in
enforcing mode and configured for enforcing mode.
That makes it easier for users to change the enforcing mode without having to
change the kernel command line (bsc#1232496).
* Version update 20230511+git21.861b7a02.
Allow sssd_t watch permission to net_conf_t dirs (bsc#1216052, bsc#1233789).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4334=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4334=1
## Package List:
* openSUSE Leap Micro 5.5 (noarch)
* selinux-policy-20230511+git21.861b7a02-150500.3.26.1
* selinux-policy-devel-20230511+git21.861b7a02-150500.3.26.1
* selinux-policy-targeted-20230511+git21.861b7a02-150500.3.26.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* selinux-policy-20230511+git21.861b7a02-150500.3.26.1
* selinux-policy-devel-20230511+git21.861b7a02-150500.3.26.1
* selinux-policy-targeted-20230511+git21.861b7a02-150500.3.26.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1216052
* https://bugzilla.suse.com/show_bug.cgi?id=1232496
* https://bugzilla.suse.com/show_bug.cgi?id=1233789
1
0
16 Dec '24
# Security update for MozillaFirefox
Announcement ID: SUSE-SU-2024:4324-1
Release Date: 2024-12-16T12:06:05Z
Rating: important
References:
* bsc#1234326
Affected Products:
* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one security fix can now be installed.
## Description:
This update for MozillaFirefox fixes the following issues:
Update to Firefox Extended Support Release 128.5.1 ESR (bsc#1234326): \- Fixed
an issue that prevented some websites from loading when using SSL Inspection.
(bmo#1933747)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4324=1
* SUSE Linux Enterprise Server 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4324=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4324=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4324=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4324=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4324=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4324=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4324=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4324=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4324=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-4324=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4324=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4324=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4324=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4324=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4324=1
## Package List:
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* MozillaFirefox-128.5.1-150200.152.164.1
* MozillaFirefox-debuginfo-128.5.1-150200.152.164.1
* MozillaFirefox-translations-common-128.5.1-150200.152.164.1
* MozillaFirefox-debugsource-128.5.1-150200.152.164.1
* MozillaFirefox-translations-other-128.5.1-150200.152.164.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch)
* MozillaFirefox-devel-128.5.1-150200.152.164.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-128.5.1-150200.152.164.1
* MozillaFirefox-debuginfo-128.5.1-150200.152.164.1
* MozillaFirefox-translations-common-128.5.1-150200.152.164.1
* MozillaFirefox-debugsource-128.5.1-150200.152.164.1
* MozillaFirefox-translations-other-128.5.1-150200.152.164.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (noarch)
* MozillaFirefox-devel-128.5.1-150200.152.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-128.5.1-150200.152.164.1
* MozillaFirefox-debuginfo-128.5.1-150200.152.164.1
* MozillaFirefox-translations-common-128.5.1-150200.152.164.1
* MozillaFirefox-debugsource-128.5.1-150200.152.164.1
* MozillaFirefox-translations-other-128.5.1-150200.152.164.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* MozillaFirefox-devel-128.5.1-150200.152.164.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-128.5.1-150200.152.164.1
* MozillaFirefox-debuginfo-128.5.1-150200.152.164.1
* MozillaFirefox-translations-common-128.5.1-150200.152.164.1
* MozillaFirefox-debugsource-128.5.1-150200.152.164.1
* MozillaFirefox-translations-other-128.5.1-150200.152.164.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* MozillaFirefox-devel-128.5.1-150200.152.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* MozillaFirefox-128.5.1-150200.152.164.1
* MozillaFirefox-debuginfo-128.5.1-150200.152.164.1
* MozillaFirefox-translations-common-128.5.1-150200.152.164.1
* MozillaFirefox-debugsource-128.5.1-150200.152.164.1
* MozillaFirefox-translations-other-128.5.1-150200.152.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* MozillaFirefox-devel-128.5.1-150200.152.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* MozillaFirefox-128.5.1-150200.152.164.1
* MozillaFirefox-debuginfo-128.5.1-150200.152.164.1
* MozillaFirefox-translations-common-128.5.1-150200.152.164.1
* MozillaFirefox-debugsource-128.5.1-150200.152.164.1
* MozillaFirefox-translations-other-128.5.1-150200.152.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* MozillaFirefox-devel-128.5.1-150200.152.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* MozillaFirefox-128.5.1-150200.152.164.1
* MozillaFirefox-debuginfo-128.5.1-150200.152.164.1
* MozillaFirefox-translations-common-128.5.1-150200.152.164.1
* MozillaFirefox-debugsource-128.5.1-150200.152.164.1
* MozillaFirefox-translations-other-128.5.1-150200.152.164.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* MozillaFirefox-devel-128.5.1-150200.152.164.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* MozillaFirefox-128.5.1-150200.152.164.1
* MozillaFirefox-debuginfo-128.5.1-150200.152.164.1
* MozillaFirefox-translations-common-128.5.1-150200.152.164.1
* MozillaFirefox-debugsource-128.5.1-150200.152.164.1
* MozillaFirefox-translations-other-128.5.1-150200.152.164.1
* SUSE Enterprise Storage 7.1 (noarch)
* MozillaFirefox-devel-128.5.1-150200.152.164.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-128.5.1-150200.152.164.1
* MozillaFirefox-debuginfo-128.5.1-150200.152.164.1
* MozillaFirefox-branding-upstream-128.5.1-150200.152.164.1
* MozillaFirefox-translations-common-128.5.1-150200.152.164.1
* MozillaFirefox-debugsource-128.5.1-150200.152.164.1
* MozillaFirefox-translations-other-128.5.1-150200.152.164.1
* openSUSE Leap 15.5 (noarch)
* MozillaFirefox-devel-128.5.1-150200.152.164.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-128.5.1-150200.152.164.1
* MozillaFirefox-debuginfo-128.5.1-150200.152.164.1
* MozillaFirefox-branding-upstream-128.5.1-150200.152.164.1
* MozillaFirefox-translations-common-128.5.1-150200.152.164.1
* MozillaFirefox-debugsource-128.5.1-150200.152.164.1
* MozillaFirefox-translations-other-128.5.1-150200.152.164.1
* openSUSE Leap 15.6 (noarch)
* MozillaFirefox-devel-128.5.1-150200.152.164.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-128.5.1-150200.152.164.1
* MozillaFirefox-debuginfo-128.5.1-150200.152.164.1
* MozillaFirefox-translations-common-128.5.1-150200.152.164.1
* MozillaFirefox-debugsource-128.5.1-150200.152.164.1
* MozillaFirefox-translations-other-128.5.1-150200.152.164.1
* Desktop Applications Module 15-SP5 (noarch)
* MozillaFirefox-devel-128.5.1-150200.152.164.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-128.5.1-150200.152.164.1
* MozillaFirefox-debuginfo-128.5.1-150200.152.164.1
* MozillaFirefox-translations-common-128.5.1-150200.152.164.1
* MozillaFirefox-debugsource-128.5.1-150200.152.164.1
* MozillaFirefox-translations-other-128.5.1-150200.152.164.1
* Desktop Applications Module 15-SP6 (noarch)
* MozillaFirefox-devel-128.5.1-150200.152.164.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (aarch64
x86_64)
* MozillaFirefox-128.5.1-150200.152.164.1
* MozillaFirefox-debuginfo-128.5.1-150200.152.164.1
* MozillaFirefox-translations-common-128.5.1-150200.152.164.1
* MozillaFirefox-debugsource-128.5.1-150200.152.164.1
* MozillaFirefox-translations-other-128.5.1-150200.152.164.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch)
* MozillaFirefox-devel-128.5.1-150200.152.164.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* MozillaFirefox-128.5.1-150200.152.164.1
* MozillaFirefox-debuginfo-128.5.1-150200.152.164.1
* MozillaFirefox-translations-common-128.5.1-150200.152.164.1
* MozillaFirefox-debugsource-128.5.1-150200.152.164.1
* MozillaFirefox-translations-other-128.5.1-150200.152.164.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* MozillaFirefox-devel-128.5.1-150200.152.164.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-128.5.1-150200.152.164.1
* MozillaFirefox-debuginfo-128.5.1-150200.152.164.1
* MozillaFirefox-translations-common-128.5.1-150200.152.164.1
* MozillaFirefox-debugsource-128.5.1-150200.152.164.1
* MozillaFirefox-translations-other-128.5.1-150200.152.164.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* MozillaFirefox-devel-128.5.1-150200.152.164.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-128.5.1-150200.152.164.1
* MozillaFirefox-debuginfo-128.5.1-150200.152.164.1
* MozillaFirefox-translations-common-128.5.1-150200.152.164.1
* MozillaFirefox-debugsource-128.5.1-150200.152.164.1
* MozillaFirefox-translations-other-128.5.1-150200.152.164.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* MozillaFirefox-devel-128.5.1-150200.152.164.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1234326
1
0
16 Dec '24
# Recommended update for go1.22-openssl
Announcement ID: SUSE-RU-2024:4325-1
Release Date: 2024-12-16T12:19:19Z
Rating: moderate
References:
* bsc#1233306
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for go1.22-openssl fixes the following issues:
* Write three digit version to file VERSION which sets go env GOVERSION. Fixes
bsc#1233306.
* Go toolchain file VERSION sets the immutable value for go env GOVERSION
* go1.x-openssl toolchains have used a bespoke fourth digit to represent the
upstream patch set release number, e.g. go1.22.9-1-openssl-fips. This digit
has not been needed.
* Some Go applications including helm break when this fourth digit is present
in VERSION, with error: go.mod requires go >= 1.22.0 (running go 1.22;
GOTOOLCHAIN=local)
* Keep the fourth digit in the packaging for now, it will be dropped in the
next toolchain version update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4325=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4325=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4325=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4325=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4325=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4325=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4325=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4325=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4325=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4325=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4325=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* go1.22-openssl-race-1.22.9.1-150000.1.9.1
* go1.22-openssl-1.22.9.1-150000.1.9.1
* go1.22-openssl-doc-1.22.9.1-150000.1.9.1
* go1.22-openssl-debuginfo-1.22.9.1-150000.1.9.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* go1.22-openssl-race-1.22.9.1-150000.1.9.1
* go1.22-openssl-1.22.9.1-150000.1.9.1
* go1.22-openssl-doc-1.22.9.1-150000.1.9.1
* go1.22-openssl-debuginfo-1.22.9.1-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* go1.22-openssl-race-1.22.9.1-150000.1.9.1
* go1.22-openssl-1.22.9.1-150000.1.9.1
* go1.22-openssl-doc-1.22.9.1-150000.1.9.1
* go1.22-openssl-debuginfo-1.22.9.1-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* go1.22-openssl-race-1.22.9.1-150000.1.9.1
* go1.22-openssl-1.22.9.1-150000.1.9.1
* go1.22-openssl-doc-1.22.9.1-150000.1.9.1
* go1.22-openssl-debuginfo-1.22.9.1-150000.1.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* go1.22-openssl-race-1.22.9.1-150000.1.9.1
* go1.22-openssl-1.22.9.1-150000.1.9.1
* go1.22-openssl-doc-1.22.9.1-150000.1.9.1
* go1.22-openssl-debuginfo-1.22.9.1-150000.1.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* go1.22-openssl-race-1.22.9.1-150000.1.9.1
* go1.22-openssl-1.22.9.1-150000.1.9.1
* go1.22-openssl-doc-1.22.9.1-150000.1.9.1
* go1.22-openssl-debuginfo-1.22.9.1-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* go1.22-openssl-race-1.22.9.1-150000.1.9.1
* go1.22-openssl-1.22.9.1-150000.1.9.1
* go1.22-openssl-doc-1.22.9.1-150000.1.9.1
* go1.22-openssl-debuginfo-1.22.9.1-150000.1.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* go1.22-openssl-race-1.22.9.1-150000.1.9.1
* go1.22-openssl-1.22.9.1-150000.1.9.1
* go1.22-openssl-doc-1.22.9.1-150000.1.9.1
* go1.22-openssl-debuginfo-1.22.9.1-150000.1.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* go1.22-openssl-race-1.22.9.1-150000.1.9.1
* go1.22-openssl-1.22.9.1-150000.1.9.1
* go1.22-openssl-doc-1.22.9.1-150000.1.9.1
* go1.22-openssl-debuginfo-1.22.9.1-150000.1.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* go1.22-openssl-race-1.22.9.1-150000.1.9.1
* go1.22-openssl-1.22.9.1-150000.1.9.1
* go1.22-openssl-doc-1.22.9.1-150000.1.9.1
* go1.22-openssl-debuginfo-1.22.9.1-150000.1.9.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* go1.22-openssl-race-1.22.9.1-150000.1.9.1
* go1.22-openssl-1.22.9.1-150000.1.9.1
* go1.22-openssl-doc-1.22.9.1-150000.1.9.1
* go1.22-openssl-debuginfo-1.22.9.1-150000.1.9.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1233306
1
0
SUSE-SU-2024:4326-1: moderate: Security update for MozillaThunderbird
by OPENSUSE-UPDATES 16 Dec '24
by OPENSUSE-UPDATES 16 Dec '24
16 Dec '24
# Security update for MozillaThunderbird
Announcement ID: SUSE-SU-2024:4326-1
Release Date: 2024-12-16T13:11:21Z
Rating: moderate
References:
* bsc#1234413
Cross-References:
* CVE-2024-50336
CVSS scores:
* CVE-2024-50336 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50336 ( NVD ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for MozillaThunderbird fixes the following issues:
* CVE-2024-50336: Fixed insufficient MXC URI validation which could allow
client-side path traversal (bsc#1234413)
Other fixes: \- Updated to Mozilla Thunderbird 128.5.2i (bsc#1234413): * fixed:
Large virtual folders could be very slow * fixed: Message could disappear after
moving from IMAP folder followed by Undo and Redo * fixed: XMPP chat did not
display messages sent inside a CDATA element * fixed: Selected calendar day did
not move forward at midnight * fixed: Today pane agenda sometimes scrolled for
no apparent reason * fixed: CalDAV calendars without offline support could
degrade start-up performance * fixed: Visual and UX improvements * fixed:
Security fixes
* Updated to Mozilla Thunderbird 128.5.1:
* new: Add end of year donation appeal
* fixed: Total message count for favorite folders did not work consistently
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4326=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4326=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4326=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4326=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-4326=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-4326=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaThunderbird-debuginfo-128.5.2-150200.8.194.1
* MozillaThunderbird-128.5.2-150200.8.194.1
* MozillaThunderbird-translations-common-128.5.2-150200.8.194.1
* MozillaThunderbird-translations-other-128.5.2-150200.8.194.1
* MozillaThunderbird-debugsource-128.5.2-150200.8.194.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaThunderbird-debuginfo-128.5.2-150200.8.194.1
* MozillaThunderbird-128.5.2-150200.8.194.1
* MozillaThunderbird-translations-common-128.5.2-150200.8.194.1
* MozillaThunderbird-translations-other-128.5.2-150200.8.194.1
* MozillaThunderbird-debugsource-128.5.2-150200.8.194.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x)
* MozillaThunderbird-debuginfo-128.5.2-150200.8.194.1
* MozillaThunderbird-128.5.2-150200.8.194.1
* MozillaThunderbird-translations-common-128.5.2-150200.8.194.1
* MozillaThunderbird-translations-other-128.5.2-150200.8.194.1
* MozillaThunderbird-debugsource-128.5.2-150200.8.194.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x)
* MozillaThunderbird-debuginfo-128.5.2-150200.8.194.1
* MozillaThunderbird-128.5.2-150200.8.194.1
* MozillaThunderbird-translations-common-128.5.2-150200.8.194.1
* MozillaThunderbird-translations-other-128.5.2-150200.8.194.1
* MozillaThunderbird-debugsource-128.5.2-150200.8.194.1
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* MozillaThunderbird-debuginfo-128.5.2-150200.8.194.1
* MozillaThunderbird-128.5.2-150200.8.194.1
* MozillaThunderbird-translations-common-128.5.2-150200.8.194.1
* MozillaThunderbird-translations-other-128.5.2-150200.8.194.1
* MozillaThunderbird-debugsource-128.5.2-150200.8.194.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* MozillaThunderbird-debuginfo-128.5.2-150200.8.194.1
* MozillaThunderbird-128.5.2-150200.8.194.1
* MozillaThunderbird-translations-common-128.5.2-150200.8.194.1
* MozillaThunderbird-translations-other-128.5.2-150200.8.194.1
* MozillaThunderbird-debugsource-128.5.2-150200.8.194.1
## References:
* https://www.suse.com/security/cve/CVE-2024-50336.html
* https://bugzilla.suse.com/show_bug.cgi?id=1234413
1
0
16 Dec '24
# Security update for python-aiohttp
Announcement ID: SUSE-SU-2024:4327-1
Release Date: 2024-12-16T13:14:43Z
Rating: important
References:
* bsc#1223726
Cross-References:
* CVE-2024-30251
CVSS scores:
* CVE-2024-30251 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* Public Cloud Module 15-SP4
* Python 3 Module 15-SP5
* Python 3 Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for python-aiohttp fixes the following issues:
* CVE-2024-30251: Fixed infinite loop on specially crafted POST request
(bsc#1223726).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4327=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4327=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4327=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4327=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4327=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4327=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4327=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-4327=1
* Python 3 Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-4327=1
* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-4327=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4327=1
## Package List:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* python-aiohttp-debugsource-3.9.3-150400.10.30.1
* python311-aiohttp-3.9.3-150400.10.30.1
* python311-aiohttp-debuginfo-3.9.3-150400.10.30.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* python-aiohttp-debugsource-3.9.3-150400.10.30.1
* python311-aiohttp-3.9.3-150400.10.30.1
* python311-aiohttp-debuginfo-3.9.3-150400.10.30.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* python-aiohttp-debugsource-3.9.3-150400.10.30.1
* python311-aiohttp-3.9.3-150400.10.30.1
* python311-aiohttp-debuginfo-3.9.3-150400.10.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* python-aiohttp-debugsource-3.9.3-150400.10.30.1
* python311-aiohttp-3.9.3-150400.10.30.1
* python311-aiohttp-debuginfo-3.9.3-150400.10.30.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python-aiohttp-debugsource-3.9.3-150400.10.30.1
* python311-aiohttp-3.9.3-150400.10.30.1
* python311-aiohttp-debuginfo-3.9.3-150400.10.30.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python-aiohttp-debugsource-3.9.3-150400.10.30.1
* python311-aiohttp-3.9.3-150400.10.30.1
* python311-aiohttp-debuginfo-3.9.3-150400.10.30.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python-aiohttp-debugsource-3.9.3-150400.10.30.1
* python311-aiohttp-3.9.3-150400.10.30.1
* python311-aiohttp-debuginfo-3.9.3-150400.10.30.1
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* python311-aiohttp-3.9.3-150400.10.30.1
* Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python-aiohttp-debugsource-3.9.3-150400.10.30.1
* python311-aiohttp-3.9.3-150400.10.30.1
* python311-aiohttp-debuginfo-3.9.3-150400.10.30.1
* Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python-aiohttp-debugsource-3.9.3-150400.10.30.1
* python311-aiohttp-3.9.3-150400.10.30.1
* python311-aiohttp-debuginfo-3.9.3-150400.10.30.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* python-aiohttp-debugsource-3.9.3-150400.10.30.1
* python311-aiohttp-3.9.3-150400.10.30.1
* python311-aiohttp-debuginfo-3.9.3-150400.10.30.1
## References:
* https://www.suse.com/security/cve/CVE-2024-30251.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223726
1
0
16 Dec '24
# Security update for python-aiohttp
Announcement ID: SUSE-SU-2024:4328-1
Release Date: 2024-12-16T13:16:13Z
Rating: important
References:
* bsc#1223726
Cross-References:
* CVE-2024-30251
CVSS scores:
* CVE-2024-30251 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* Public Cloud Module 15-SP2
* Public Cloud Module 15-SP3
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.1
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for python-aiohttp fixes the following issues:
* CVE-2024-30251: Fixed infinite loop on specially crafted POST request
(bsc#1223726).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4328=1
* Public Cloud Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-4328=1
* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-4328=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-4328=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-4328=1
* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-4328=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python-aiohttp-debugsource-3.6.0-150100.3.21.1
* python3-aiohttp-3.6.0-150100.3.21.1
* python-aiohttp-doc-3.6.0-150100.3.21.1
* python3-aiohttp-debuginfo-3.6.0-150100.3.21.1
* Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64)
* python-aiohttp-debugsource-3.6.0-150100.3.21.1
* python3-aiohttp-3.6.0-150100.3.21.1
* python-aiohttp-doc-3.6.0-150100.3.21.1
* python3-aiohttp-debuginfo-3.6.0-150100.3.21.1
* Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64)
* python-aiohttp-debugsource-3.6.0-150100.3.21.1
* python3-aiohttp-3.6.0-150100.3.21.1
* python3-aiohttp-debuginfo-3.6.0-150100.3.21.1
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* python-aiohttp-debugsource-3.6.0-150100.3.21.1
* python3-aiohttp-3.6.0-150100.3.21.1
* python3-aiohttp-debuginfo-3.6.0-150100.3.21.1
* Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python-aiohttp-debugsource-3.6.0-150100.3.21.1
* python3-aiohttp-3.6.0-150100.3.21.1
* python3-aiohttp-debuginfo-3.6.0-150100.3.21.1
* Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python-aiohttp-debugsource-3.6.0-150100.3.21.1
* python3-aiohttp-3.6.0-150100.3.21.1
* python3-aiohttp-debuginfo-3.6.0-150100.3.21.1
## References:
* https://www.suse.com/security/cve/CVE-2024-30251.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223726
1
0
SUSE-SU-2024:4329-1: critical: Security update for aws-iam-authenticator
by OPENSUSE-UPDATES 16 Dec '24
by OPENSUSE-UPDATES 16 Dec '24
16 Dec '24
# Security update for aws-iam-authenticator
Announcement ID: SUSE-SU-2024:4329-1
Release Date: 2024-12-16T13:16:54Z
Rating: critical
References:
* bsc#1200528
Cross-References:
* CVE-2022-1996
CVSS scores:
* CVE-2022-1996 ( SUSE ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2022-1996 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2022-1996 ( NVD ): 9.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* Public Cloud Module 15-SP2
* Public Cloud Module 15-SP3
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.1
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for aws-iam-authenticator fixes the following issues:
* CVE-2022-1996: Fixed CORS bypass (bsc#1200528).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4329=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4329=1
* Public Cloud Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-4329=1
* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-4329=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-4329=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-4329=1
* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-4329=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* aws-iam-authenticator-0.5.3-150000.1.12.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* aws-iam-authenticator-0.5.3-150000.1.12.1
* Public Cloud Module 15-SP2 (x86_64)
* aws-iam-authenticator-0.5.3-150000.1.12.1
* Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64)
* aws-iam-authenticator-0.5.3-150000.1.12.1
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* aws-iam-authenticator-0.5.3-150000.1.12.1
* Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* aws-iam-authenticator-0.5.3-150000.1.12.1
* Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* aws-iam-authenticator-0.5.3-150000.1.12.1
## References:
* https://www.suse.com/security/cve/CVE-2022-1996.html
* https://bugzilla.suse.com/show_bug.cgi?id=1200528
1
0
# Security update for vim
Announcement ID: SUSE-SU-2024:4330-1
Release Date: 2024-12-16T13:17:36Z
Rating: low
References:
* bsc#1229238
* bsc#1231373
Cross-References:
* CVE-2024-43374
* CVE-2024-47814
CVSS scores:
* CVE-2024-43374 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-43374 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-47814 ( SUSE ): 2.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L
* CVE-2024-47814 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
* CVE-2024-47814 ( NVD ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for vim fixes the following issues:
* CVE-2024-47814: Fixed use-after-free when closing buffers in Vim
(bsc#1231373)
* CVE-2024-43374: Fixed use-after-free in alist_add() (bsc#1229238)
Other fixes:
* Updated to version 9.1.0836
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4330=1 openSUSE-SLE-15.5-2024-4330=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4330=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4330=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4330=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4330=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4330=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-4330=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4330=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* vim-small-9.1.0836-150500.20.15.1
* gvim-9.1.0836-150500.20.15.1
* vim-debuginfo-9.1.0836-150500.20.15.1
* gvim-debuginfo-9.1.0836-150500.20.15.1
* vim-small-debuginfo-9.1.0836-150500.20.15.1
* vim-debugsource-9.1.0836-150500.20.15.1
* vim-9.1.0836-150500.20.15.1
* openSUSE Leap 15.5 (noarch)
* vim-data-common-9.1.0836-150500.20.15.1
* vim-data-9.1.0836-150500.20.15.1
* openSUSE Leap Micro 5.5 (noarch)
* vim-data-common-9.1.0836-150500.20.15.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* vim-debugsource-9.1.0836-150500.20.15.1
* vim-debuginfo-9.1.0836-150500.20.15.1
* vim-small-9.1.0836-150500.20.15.1
* vim-small-debuginfo-9.1.0836-150500.20.15.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* vim-small-9.1.0836-150500.20.15.1
* gvim-9.1.0836-150500.20.15.1
* vim-debuginfo-9.1.0836-150500.20.15.1
* gvim-debuginfo-9.1.0836-150500.20.15.1
* vim-small-debuginfo-9.1.0836-150500.20.15.1
* vim-debugsource-9.1.0836-150500.20.15.1
* vim-9.1.0836-150500.20.15.1
* openSUSE Leap 15.6 (noarch)
* vim-data-common-9.1.0836-150500.20.15.1
* vim-data-9.1.0836-150500.20.15.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* vim-data-common-9.1.0836-150500.20.15.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* vim-debugsource-9.1.0836-150500.20.15.1
* vim-debuginfo-9.1.0836-150500.20.15.1
* vim-small-9.1.0836-150500.20.15.1
* vim-small-debuginfo-9.1.0836-150500.20.15.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* vim-small-9.1.0836-150500.20.15.1
* vim-debuginfo-9.1.0836-150500.20.15.1
* vim-small-debuginfo-9.1.0836-150500.20.15.1
* vim-debugsource-9.1.0836-150500.20.15.1
* vim-9.1.0836-150500.20.15.1
* Basesystem Module 15-SP5 (noarch)
* vim-data-common-9.1.0836-150500.20.15.1
* vim-data-9.1.0836-150500.20.15.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* vim-small-9.1.0836-150500.20.15.1
* vim-debuginfo-9.1.0836-150500.20.15.1
* vim-small-debuginfo-9.1.0836-150500.20.15.1
* vim-debugsource-9.1.0836-150500.20.15.1
* vim-9.1.0836-150500.20.15.1
* Basesystem Module 15-SP6 (noarch)
* vim-data-common-9.1.0836-150500.20.15.1
* vim-data-9.1.0836-150500.20.15.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* vim-debugsource-9.1.0836-150500.20.15.1
* vim-debuginfo-9.1.0836-150500.20.15.1
* gvim-debuginfo-9.1.0836-150500.20.15.1
* gvim-9.1.0836-150500.20.15.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* vim-debugsource-9.1.0836-150500.20.15.1
* vim-debuginfo-9.1.0836-150500.20.15.1
* gvim-debuginfo-9.1.0836-150500.20.15.1
* gvim-9.1.0836-150500.20.15.1
## References:
* https://www.suse.com/security/cve/CVE-2024-43374.html
* https://www.suse.com/security/cve/CVE-2024-47814.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229238
* https://bugzilla.suse.com/show_bug.cgi?id=1231373
1
0
16 Dec '24
# Recommended update for ktls-utils
Announcement ID: SUSE-RU-2024:4331-1
Release Date: 2024-12-16T13:55:42Z
Rating: moderate
References:
* bsc#1233286
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for ktls-utils fixes the following issue:
* Version update 0.10+13.gd575b3b:
* tlshd: always link .nvme default keyring into the session (bsc#1233286).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4331=1 openSUSE-SLE-15.6-2024-4331=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4331=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* ktls-utils-debuginfo-0.10+13.gd575b3b-150600.3.3.2
* ktls-utils-debugsource-0.10+13.gd575b3b-150600.3.3.2
* ktls-utils-0.10+13.gd575b3b-150600.3.3.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* ktls-utils-debuginfo-0.10+13.gd575b3b-150600.3.3.2
* ktls-utils-debugsource-0.10+13.gd575b3b-150600.3.3.2
* ktls-utils-0.10+13.gd575b3b-150600.3.3.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1233286
1
0
16 Dec '24
# Recommended update for go1.23-openssl
Announcement ID: SUSE-RU-2024:4332-1
Release Date: 2024-12-16T15:08:28Z
Rating: moderate
References:
* bsc#1233306
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for go1.23-openssl fixes the following issues:
* Write three digit version to file VERSION which sets go env GOVERSION. Fixes
bsc#1233306.
* Go toolchain file VERSION sets the immutable value for go env GOVERSION
* go1.x-openssl toolchains have used a bespoke fourth digit to represent the
upstream patch set release number, e.g. go1.22.9-1-openssl-fips. This digit
has not been needed.
* Some Go applications including helm break when this fourth digit is present
in VERSION, with error: go.mod requires go >= 1.22.0 (running go 1.22;
GOTOOLCHAIN=local)
* Keep the fourth digit in the packaging for now, it will be dropped in the
next toolchain version update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4332=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4332=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4332=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4332=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4332=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4332=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4332=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4332=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4332=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4332=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4332=1
## Package List:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* go1.23-openssl-doc-1.23.2.2-150000.1.6.1
* go1.23-openssl-race-1.23.2.2-150000.1.6.1
* go1.23-openssl-1.23.2.2-150000.1.6.1
* go1.23-openssl-debuginfo-1.23.2.2-150000.1.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* go1.23-openssl-doc-1.23.2.2-150000.1.6.1
* go1.23-openssl-race-1.23.2.2-150000.1.6.1
* go1.23-openssl-1.23.2.2-150000.1.6.1
* go1.23-openssl-debuginfo-1.23.2.2-150000.1.6.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* go1.23-openssl-doc-1.23.2.2-150000.1.6.1
* go1.23-openssl-race-1.23.2.2-150000.1.6.1
* go1.23-openssl-1.23.2.2-150000.1.6.1
* go1.23-openssl-debuginfo-1.23.2.2-150000.1.6.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* go1.23-openssl-doc-1.23.2.2-150000.1.6.1
* go1.23-openssl-race-1.23.2.2-150000.1.6.1
* go1.23-openssl-1.23.2.2-150000.1.6.1
* go1.23-openssl-debuginfo-1.23.2.2-150000.1.6.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* go1.23-openssl-doc-1.23.2.2-150000.1.6.1
* go1.23-openssl-race-1.23.2.2-150000.1.6.1
* go1.23-openssl-1.23.2.2-150000.1.6.1
* go1.23-openssl-debuginfo-1.23.2.2-150000.1.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* go1.23-openssl-doc-1.23.2.2-150000.1.6.1
* go1.23-openssl-race-1.23.2.2-150000.1.6.1
* go1.23-openssl-1.23.2.2-150000.1.6.1
* go1.23-openssl-debuginfo-1.23.2.2-150000.1.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* go1.23-openssl-doc-1.23.2.2-150000.1.6.1
* go1.23-openssl-race-1.23.2.2-150000.1.6.1
* go1.23-openssl-1.23.2.2-150000.1.6.1
* go1.23-openssl-debuginfo-1.23.2.2-150000.1.6.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* go1.23-openssl-doc-1.23.2.2-150000.1.6.1
* go1.23-openssl-race-1.23.2.2-150000.1.6.1
* go1.23-openssl-1.23.2.2-150000.1.6.1
* go1.23-openssl-debuginfo-1.23.2.2-150000.1.6.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* go1.23-openssl-doc-1.23.2.2-150000.1.6.1
* go1.23-openssl-race-1.23.2.2-150000.1.6.1
* go1.23-openssl-1.23.2.2-150000.1.6.1
* go1.23-openssl-debuginfo-1.23.2.2-150000.1.6.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* go1.23-openssl-doc-1.23.2.2-150000.1.6.1
* go1.23-openssl-race-1.23.2.2-150000.1.6.1
* go1.23-openssl-1.23.2.2-150000.1.6.1
* go1.23-openssl-debuginfo-1.23.2.2-150000.1.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* go1.23-openssl-doc-1.23.2.2-150000.1.6.1
* go1.23-openssl-race-1.23.2.2-150000.1.6.1
* go1.23-openssl-1.23.2.2-150000.1.6.1
* go1.23-openssl-debuginfo-1.23.2.2-150000.1.6.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1233306
1
0
16 Dec '24
# Feature update for libphonenumber
Announcement ID: SUSE-FU-2024:4320-1
Release Date: 2024-12-16T08:31:15Z
Rating: low
References:
* bsc#1224399
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP6
* SUSE Package Hub 15 15-SP6
An update that has one fix can now be installed.
## Description:
This update for libphonenumber fixes the following issues:
* Add libphonenumber8 to Packagehub 15-SP6 (bsc#1224399)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4320=1 openSUSE-SLE-15.6-2024-4320=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4320=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-4320=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libphonenumber8-8.13.30-150600.3.2.1
* libphonenumber-debugsource-8.13.30-150600.3.2.1
* libphonenumber-devel-8.13.30-150600.3.2.1
* libphonenumber8-debuginfo-8.13.30-150600.3.2.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x)
* libphonenumber8-8.13.30-150600.3.2.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* libphonenumber8-8.13.30-150600.3.2.1
* libphonenumber-debugsource-8.13.30-150600.3.2.1
* libphonenumber8-debuginfo-8.13.30-150600.3.2.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1224399
1
0
16 Dec '24
# Recommended update for firewalld
Announcement ID: SUSE-RU-2024:4321-1
Release Date: 2024-12-16T08:36:31Z
Rating: important
References:
* bsc#1231771
Affected Products:
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP6
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for firewalld fixes the following issues:
* Fix firewalld incorrectly applying oifname and daddr, resulting in incorrect
rule generation and filtering (bsc#1231771)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4321=1 SUSE-2024-4321=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4321=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4321=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4321=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* firewall-config-2.0.1-150600.3.5.1
* firewall-applet-2.0.1-150600.3.5.1
* firewalld-zsh-completion-2.0.1-150600.3.5.1
* firewalld-2.0.1-150600.3.5.1
* firewall-macros-2.0.1-150600.3.5.1
* firewalld-test-2.0.1-150600.3.5.1
* firewalld-bash-completion-2.0.1-150600.3.5.1
* firewalld-lang-2.0.1-150600.3.5.1
* python3-firewall-2.0.1-150600.3.5.1
* Basesystem Module 15-SP6 (noarch)
* firewalld-zsh-completion-2.0.1-150600.3.5.1
* firewalld-2.0.1-150600.3.5.1
* firewalld-bash-completion-2.0.1-150600.3.5.1
* firewalld-lang-2.0.1-150600.3.5.1
* python3-firewall-2.0.1-150600.3.5.1
* Desktop Applications Module 15-SP6 (noarch)
* firewall-config-2.0.1-150600.3.5.1
* firewall-applet-2.0.1-150600.3.5.1
* Development Tools Module 15-SP6 (noarch)
* firewall-macros-2.0.1-150600.3.5.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1231771
1
0
SUSE-RU-2024:4322-1: moderate: Recommended update for nvidia-open-driver-G06-signed
by OPENSUSE-UPDATES 16 Dec '24
by OPENSUSE-UPDATES 16 Dec '24
16 Dec '24
# Recommended update for nvidia-open-driver-G06-signed
Announcement ID: SUSE-RU-2024:4322-1
Release Date: 2024-12-16T09:07:00Z
Rating: moderate
References:
* bsc#1233332
* bsc#1233673
Affected Products:
* openSUSE Leap 15.4
* Public Cloud Module 15-SP4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has two fixes can now be installed.
## Description:
This update for nvidia-open-driver-G06-signed fixes the following issues:
* For CUDA update version to 565.57.01
* Add 'dummy' firmware package on SLE to work around update issues. On SLE,
the firmware is installed directly from an NVIDIA-hosted repo.
* Improve handling of conflicts between different flavors (gfx vs. CUDA)
(bsc#1233332).
* Update to 550.135 (bsc#1233673)
* fixes wrong logic for checking supported architectures
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4322=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4322=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4322=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4322=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4322=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-4322=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4322=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4322=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4322=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4322=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4322=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4322=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4322=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4322=1
## Package List:
* openSUSE Leap 15.4 (x86_64)
* nvidia-open-driver-G06-signed-cuda-kmp-azure-debuginfo-565.57.01_k5.14.21_150400.12-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-azure-565.57.01_k5.14.21_150400.12-150400.9.76.1
* nvidia-open-driver-G06-signed-azure-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.135_k5.14.21_150400.12-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-azure-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-azure-550.135_k5.14.21_150400.12-150400.9.76.1
* openSUSE Leap 15.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* openSUSE Leap 15.4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-64kb-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* Public Cloud Module 15-SP4 (x86_64)
* nvidia-open-driver-G06-signed-cuda-kmp-azure-debuginfo-565.57.01_k5.14.21_150400.12-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-azure-565.57.01_k5.14.21_150400.12-150400.9.76.1
* nvidia-open-driver-G06-signed-azure-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.135_k5.14.21_150400.12-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-azure-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-azure-550.135_k5.14.21_150400.12-150400.9.76.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-64kb-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-64kb-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-64kb-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* SUSE Manager Proxy 4.3 (x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
* SUSE Manager Server 4.3 (x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150400.9.76.1
* nv-prefer-signed-open-driver-565.57.01-150400.9.76.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150400.22-150400.9.76.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150400.22-150400.9.76.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1233332
* https://bugzilla.suse.com/show_bug.cgi?id=1233673
1
0
openSUSE-SU-2024:0408-1: moderate: Security update for python-Django
by opensuse-securityďĽ opensuse.org 14 Dec '24
by opensuse-securityďĽ opensuse.org 14 Dec '24
14 Dec '24
openSUSE Security Update: Security update for python-Django
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0408-1
Rating: moderate
References: #1234232
Cross-References: CVE-2024-53907
CVSS scores:
CVE-2024-53907 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for python-Django fixes the following issues:
- CVE-2024-53907: Fixed potential denial-of-service in
django.utils.html.strip_tags() (boo#1234232).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-408=1
Package List:
References:
https://www.suse.com/security/cve/CVE-2024-53907.html
https://bugzilla.suse.com/1234232
1
0
openSUSE-RU-2024:0407-1: moderate: Recommended update for orthanc-ohif
by maintenanceďĽ opensuse.org 14 Dec '24
by maintenanceďĽ opensuse.org 14 Dec '24
14 Dec '24
openSUSE Recommended Update: Recommended update for orthanc-ohif
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0407-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for orthanc-ohif fixes the following issues:
Version 1.4:
* Updated OHIF to 3.9.1
* The default value for the "DataSource" configuration is now
"dicom-web" instead of "dicom-json" since "dicom-web" is usually more
optimized.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-407=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le s390x x86_64):
orthanc-ohif-1.4-bp156.2.6.1
References:
1
0
SUSE-RU-2024:4310-1: moderate: Recommended update for nvidia-open-driver-G06-signed
by OPENSUSE-UPDATES 13 Dec '24
by OPENSUSE-UPDATES 13 Dec '24
13 Dec '24
# Recommended update for nvidia-open-driver-G06-signed
Announcement ID: SUSE-RU-2024:4310-1
Release Date: 2024-12-13T14:20:45Z
Rating: moderate
References:
* bsc#1229716
* bsc#1230368
* bsc#1230779
* bsc#1232057
* bsc#1233332
* bsc#1233673
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has six fixes can now be installed.
## Description:
This update for nvidia-open-driver-G06-signed fixes the following issues:
* resolve self conflicts of -cuda KMP during update by adding obsoletes to
older versions (boo#1233332)
Update to 550.135 (boo#1232057 boo#1233673):
* fixes wrong logic for checking supported architectures
* Fixed a bug which could cause applications using GBM to crash when running
with nvidia-drm.modeset=0.
* cuda-flavor provide also nvidia-open-driver-G06-kmp-$flavor = %version to
workaround broken cuda-drivers
* For CUDA update version to 560.35.03
* cuda-flavor
* provide nvidia-open-driver-G06-kmp = %version to workaround broken cuda-
drivers
* latest change hardcoded to 555.42.06; we no longer need this for 560
* nv-prefer-signed-open-driver:
* added specific versions of cuda-drivers/cuda-drivers-xxx as preconditions
for requiring specific version of nvidia-compute-G06
* nv-prefer-signed-open-driver:
* no longer require a specific version of nvidia-open-driver-G06-signed-cuda-
kmp, so it can select the correct open driver KMP matching the cuda-runtime
version
* cuda-flavor:
* added nvidia-compute-G06 = %version to preconditions for requiring kernel-
firmware-nvidia-gspx-G06, since nvidia-compute-utils-G06 does not have a
version-specific requires on nvidia-compute-G06
* cuda-flavor:
* require kernel-firmware-nvidia-gspx-G06 instead of kernel-firmware-nvidia-
gspx-G06-cuda (which provides also kernel-firmware-nvidia-gspx-G06)
* trigger removal of driver modules also on kernel-firmware-nvidia-gspx-G06
* no longer hard-require kernel firmware package, but install it automatically
once nvidia-compute-utils-G06 gets installed
* trigger removal of driver modules with non-existing or wrong firmware when
(new) firmware gets installed
* Update to 550.120 (bsc#1230779)
* Fixed a bug that could cause kernel crashes upon attempting KMS operations
through DRM when nvidia_drm was loaded with modeset=0.
* CUDA build: removed entries from pci_ids-555.42.06 since this is doing more
harm than benefit (bsc#1230368)
* For CUDA (preamble file):
* added: Provides: nvidia-open-driver-G06-signed-cuda-kmp-$flavor = %version
which is needed for 'zypper install <package> = <version>'
* added: Provides/Conflicts: nvidia-open-driver-G06-signed-kmp-$flavor =
%version useful for containers
* reverted CUDA update version to 560.x.y due to changes in CUDA repository
with CUDA 12.6/560.x.y drivers
* For CUDA update version to 560.35.03
* Update to 550.107.02 (bsc#1229716)
* For CUDA update version to 560.28.03
* better summary and description for KMP
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4310=1 openSUSE-SLE-15.6-2024-4310=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4310=1
* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-4310=1
## Package List:
* openSUSE Leap 15.6 (x86_64)
* nvidia-open-driver-G06-signed-kmp-azure-550.135_k6.4.0_150600.6-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-azure-565.57.01_k6.4.0_150600.6-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-azure-debuginfo-565.57.01_k6.4.0_150600.6-150600.3.20.2
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.135_k6.4.0_150600.6-150600.3.20.2
* nvidia-open-driver-G06-signed-azure-devel-550.135-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-azure-devel-565.57.01-150600.3.20.2
* openSUSE Leap 15.6 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k6.4.0_150600.21-150600.3.20.2
* nv-prefer-signed-open-driver-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-debugsource-550.135-150600.3.20.2
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-kmp-default-550.135_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-default-devel-550.135-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k6.4.0_150600.21-150600.3.20.2
* openSUSE Leap 15.6 (aarch64)
* nvidia-open-driver-G06-signed-cuda-64kb-devel-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.135_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-565.57.01_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-64kb-devel-550.135-150600.3.20.2
* nvidia-open-driver-G06-signed-kmp-64kb-550.135_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-565.57.01_k6.4.0_150600.21-150600.3.20.2
* Basesystem Module 15-SP6 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k6.4.0_150600.21-150600.3.20.2
* nv-prefer-signed-open-driver-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-debugsource-550.135-150600.3.20.2
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-kmp-default-550.135_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-default-devel-550.135-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k6.4.0_150600.21-150600.3.20.2
* Basesystem Module 15-SP6 (aarch64)
* nvidia-open-driver-G06-signed-kmp-64kb-550.135_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-64kb-devel-565.57.01-150600.3.20.2
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.135_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-565.57.01_k6.4.0_150600.21-150600.3.20.2
* nvidia-open-driver-G06-signed-64kb-devel-550.135-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-565.57.01_k6.4.0_150600.21-150600.3.20.2
* Public Cloud Module 15-SP6 (x86_64)
* nvidia-open-driver-G06-signed-cuda-kmp-azure-565.57.01_k6.4.0_150600.6-150600.3.20.2
* nvidia-open-driver-G06-signed-kmp-azure-550.135_k6.4.0_150600.6-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-kmp-azure-debuginfo-565.57.01_k6.4.0_150600.6-150600.3.20.2
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.135_k6.4.0_150600.6-150600.3.20.2
* nvidia-open-driver-G06-signed-azure-devel-550.135-150600.3.20.2
* nvidia-open-driver-G06-signed-cuda-azure-devel-565.57.01-150600.3.20.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229716
* https://bugzilla.suse.com/show_bug.cgi?id=1230368
* https://bugzilla.suse.com/show_bug.cgi?id=1230779
* https://bugzilla.suse.com/show_bug.cgi?id=1232057
* https://bugzilla.suse.com/show_bug.cgi?id=1233332
* https://bugzilla.suse.com/show_bug.cgi?id=1233673
1
0
13 Dec '24
# Recommended update for fence-agents
Announcement ID: SUSE-RU-2024:4312-1
Release Date: 2024-12-13T14:31:28Z
Rating: moderate
References:
* jsc#PED-11661
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that contains one feature can now be installed.
## Description:
This update for fence-agents fixes the following issue:
* eaton SSH Fence Agent (jsc#PED-11661)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4312=1 SUSE-2024-4312=1
* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-4312=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* fence-agents-4.13.1+git.1704296072.32469f29-150600.3.12.2
* fence-agents-debuginfo-4.13.1+git.1704296072.32469f29-150600.3.12.2
* fence-agents-devel-4.13.1+git.1704296072.32469f29-150600.3.12.2
* fence-agents-debugsource-4.13.1+git.1704296072.32469f29-150600.3.12.2
* fence-agents-amt_ws-4.13.1+git.1704296072.32469f29-150600.3.12.2
* openSUSE Leap 15.6 (noarch)
* fence-agents-azure-arm-4.13.1+git.1704296072.32469f29-150600.3.12.2
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* fence-agents-devel-4.13.1+git.1704296072.32469f29-150600.3.12.2
* fence-agents-4.13.1+git.1704296072.32469f29-150600.3.12.2
* fence-agents-debuginfo-4.13.1+git.1704296072.32469f29-150600.3.12.2
* fence-agents-debugsource-4.13.1+git.1704296072.32469f29-150600.3.12.2
* SUSE Linux Enterprise High Availability Extension 15 SP6 (noarch)
* fence-agents-azure-arm-4.13.1+git.1704296072.32469f29-150600.3.12.2
## References:
* https://jira.suse.com/browse/PED-11661
1
0
13 Dec '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:4313-1
Release Date: 2024-12-13T15:20:18Z
Rating: important
References:
* bsc#1154353
* bsc#1198778
* bsc#1218644
* bsc#1220927
* bsc#1231939
* bsc#1231940
* bsc#1231958
* bsc#1231962
* bsc#1231991
* bsc#1231992
* bsc#1231995
* bsc#1232006
* bsc#1232163
* bsc#1232172
* bsc#1232224
* bsc#1232436
* bsc#1232860
* bsc#1232907
* bsc#1232919
* bsc#1232928
* bsc#1233070
* bsc#1233117
* bsc#1233293
* bsc#1233453
* bsc#1233456
* bsc#1233468
* bsc#1233479
* bsc#1233490
* bsc#1233491
* bsc#1233555
* bsc#1233557
* jsc#SLE-8100
Cross-References:
* CVE-2022-48985
* CVE-2022-49006
* CVE-2022-49010
* CVE-2022-49011
* CVE-2022-49019
* CVE-2022-49021
* CVE-2022-49022
* CVE-2022-49029
* CVE-2022-49031
* CVE-2022-49032
* CVE-2023-52524
* CVE-2024-49925
* CVE-2024-50089
* CVE-2024-50115
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50154
* CVE-2024-50205
* CVE-2024-50208
* CVE-2024-50264
* CVE-2024-50267
* CVE-2024-50279
* CVE-2024-50290
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53061
* CVE-2024-53063
CVSS scores:
* CVE-2022-48985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48985 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49006 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49006 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49006 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49010 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49022 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49029 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49031 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-49032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49032 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50208 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Availability Extension 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 Business Critical Linux
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Manager Proxy 4.2
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Server 4.2
An update that solves 27 vulnerabilities, contains one feature and has four
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
* CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
(bsc#1232224)
* CVE-2024-50089: unicode: Do not special case ignorable code points
(bsc#1232860).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink()
(bsc#1233070)
* CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in
apply_constraint_to_size() (bsc#1233293).
* CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
(bsc#1233117).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50267: USB: serial: io_edgeport: fix use after free in debug printk
(bsc#1233456).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50290: media: cx24116: prevent overflows on SNR calculus
(bsc#1233479).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233490).
* CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233491).
* CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
* CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access
(bsc#1233557).
The following non-security bugs were fixed:
* Update config files (bsc#1218644).
* e1000e: Correct NVM checksum verification flow (jsc#SLE-8100).
* e1000e: Correct NVM checksum verification flow (jsc#SLE-8100).
* e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
* e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
* ena: Remove rcu_read_lock() around XDP program invocation (bsc#1198778).
* ethernet: amazon: ena: A typo fix in the file ena_com.h (bsc#1198778).
* initramfs: avoid filename buffer overrun (bsc#1232436).
* kernel-binary: Enable livepatch package only when livepatch is enabled
Otherwise the filelist may be empty failing the build (bsc#1218644).
* net: ena: Add capabilities field with support for ENI stats capability
(bsc#1198778).
* net: ena: Add debug prints for invalid req_id resets (bsc#1198778).
* net: ena: Change ENI stats support check to use capabilities field
(bsc#1198778).
* net: ena: Change return value of ena_calc_io_queue_size() to void
(bsc#1198778).
* net: ena: Change the name of bad_csum variable (bsc#1198778).
* net: ena: Extract recurring driver reset code into a function (bsc#1198778).
* net: ena: Flush XDP packets on error (bsc#1198778).
* net: ena: Improve error logging in driver (bsc#1198778).
* net: ena: Move reset completion print to the reset function (bsc#1198778).
* net: ena: Remove ena_calc_queue_size_ctx struct (bsc#1198778).
* net: ena: Remove module param and change message severity (bsc#1198778).
* net: ena: Remove redundant return code check (bsc#1198778).
* net: ena: Remove unused code (bsc#1198778).
* net: ena: Set tx_info->xdpf value to NULL (bsc#1198778).
* net: ena: Update XDP verdict upon failure (bsc#1198778).
* net: ena: Use bitmask to indicate packet redirection (bsc#1198778).
* net: ena: Use dev_alloc() in RX buffer allocation (bsc#1198778).
* net: ena: add device distinct log prefix to files (bsc#1198778).
* net: ena: add jiffies of last napi call to stats (bsc#1198778).
* net: ena: aggregate doorbell common operations into a function
(bsc#1198778).
* net: ena: aggregate stats increase into a function (bsc#1198778).
* net: ena: fix DMA mapping function issues in XDP (bsc#1198778).
* net: ena: fix coding style nits (bsc#1198778).
* net: ena: fix inaccurate print type (bsc#1198778).
* net: ena: introduce XDP redirect implementation (bsc#1198778).
* net: ena: introduce ndo_xdp_xmit() function for XDP_REDIRECT (bsc#1198778).
* net: ena: make symbol 'ena_alloc_map_page' static (bsc#1198778).
* net: ena: re-organize code to improve readability (bsc#1198778).
* net: ena: remove extra words from comments (bsc#1198778).
* net: ena: store values in their appropriate variables types (bsc#1198778).
* net: ena: use build_skb() in RX path (bsc#1198778).
* net: ena: use constant value for net_device allocation (bsc#1198778).
* net: ena: use xdp_frame in XDP TX flow (bsc#1198778).
* net: ena: use xdp_return_frame() to free xdp frames (bsc#1198778).
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation. (bsc#1218644)
* tools headers: Grab copy of linux/const.h, needed by linux/bits.h
(bsc#1154353).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4313=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4313=1
* SUSE Linux Enterprise High Availability Extension 15 SP3
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-4313=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4313=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4313=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4313=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4313=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-4313=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4313=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4313=1
## Package List:
* openSUSE Leap 15.3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (noarch)
* kernel-docs-html-5.3.18-150300.59.185.1
* kernel-source-vanilla-5.3.18-150300.59.185.1
* kernel-source-5.3.18-150300.59.185.1
* kernel-devel-5.3.18-150300.59.185.1
* kernel-macros-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (nosrc ppc64le x86_64)
* kernel-kvmsmall-5.3.18-150300.59.185.1
* kernel-debug-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (ppc64le x86_64)
* kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-debug-debuginfo-5.3.18-150300.59.185.1
* kernel-debug-debugsource-5.3.18-150300.59.185.1
* kernel-kvmsmall-debuginfo-5.3.18-150300.59.185.1
* kernel-debug-devel-5.3.18-150300.59.185.1
* kernel-kvmsmall-debugsource-5.3.18-150300.59.185.1
* kernel-debug-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-kvmsmall-devel-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-optional-debuginfo-5.3.18-150300.59.185.1
* kernel-default-base-rebuild-5.3.18-150300.59.185.1.150300.18.109.1
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* cluster-md-kmp-default-5.3.18-150300.59.185.1
* ocfs2-kmp-default-5.3.18-150300.59.185.1
* kernel-obs-build-5.3.18-150300.59.185.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-devel-5.3.18-150300.59.185.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-extra-debuginfo-5.3.18-150300.59.185.1
* gfs2-kmp-default-5.3.18-150300.59.185.1
* kernel-default-livepatch-5.3.18-150300.59.185.1
* kernel-default-extra-5.3.18-150300.59.185.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-obs-qa-5.3.18-150300.59.185.1
* dlm-kmp-default-5.3.18-150300.59.185.1
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kselftests-kmp-default-debuginfo-5.3.18-150300.59.185.1
* reiserfs-kmp-default-5.3.18-150300.59.185.1
* kernel-obs-build-debugsource-5.3.18-150300.59.185.1
* dlm-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kselftests-kmp-default-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-optional-5.3.18-150300.59.185.1
* kernel-syms-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_185-default-debuginfo-1-150300.7.3.1
* kernel-default-livepatch-devel-5.3.18-150300.59.185.1
* kernel-livepatch-SLE15-SP3_Update_51-debugsource-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_185-default-1-150300.7.3.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_185-preempt-1-150300.7.3.1
* kernel-livepatch-5_3_18-150300_59_185-preempt-debuginfo-1-150300.7.3.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* kselftests-kmp-preempt-5.3.18-150300.59.185.1
* kernel-preempt-optional-5.3.18-150300.59.185.1
* kernel-preempt-debugsource-5.3.18-150300.59.185.1
* reiserfs-kmp-preempt-5.3.18-150300.59.185.1
* ocfs2-kmp-preempt-5.3.18-150300.59.185.1
* dlm-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1
* cluster-md-kmp-preempt-5.3.18-150300.59.185.1
* cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* gfs2-kmp-preempt-5.3.18-150300.59.185.1
* gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-5.3.18-150300.59.185.1
* dlm-kmp-preempt-5.3.18-150300.59.185.1
* kernel-preempt-extra-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-extra-5.3.18-150300.59.185.1
* kernel-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-optional-debuginfo-5.3.18-150300.59.185.1
* reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (s390x)
* kernel-zfcpdump-debugsource-5.3.18-150300.59.185.1
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (nosrc)
* dtb-aarch64-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (aarch64)
* dtb-xilinx-5.3.18-150300.59.185.1
* dtb-altera-5.3.18-150300.59.185.1
* dtb-zte-5.3.18-150300.59.185.1
* dtb-sprd-5.3.18-150300.59.185.1
* ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-extra-5.3.18-150300.59.185.1
* dtb-al-5.3.18-150300.59.185.1
* dtb-broadcom-5.3.18-150300.59.185.1
* kernel-64kb-optional-5.3.18-150300.59.185.1
* dtb-apm-5.3.18-150300.59.185.1
* dtb-exynos-5.3.18-150300.59.185.1
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-optional-debuginfo-5.3.18-150300.59.185.1
* ocfs2-kmp-64kb-5.3.18-150300.59.185.1
* reiserfs-kmp-64kb-5.3.18-150300.59.185.1
* dtb-rockchip-5.3.18-150300.59.185.1
* kselftests-kmp-64kb-5.3.18-150300.59.185.1
* dtb-marvell-5.3.18-150300.59.185.1
* gfs2-kmp-64kb-5.3.18-150300.59.185.1
* dtb-freescale-5.3.18-150300.59.185.1
* dtb-amlogic-5.3.18-150300.59.185.1
* kernel-64kb-debugsource-5.3.18-150300.59.185.1
* dtb-nvidia-5.3.18-150300.59.185.1
* dtb-hisilicon-5.3.18-150300.59.185.1
* dtb-amd-5.3.18-150300.59.185.1
* dtb-qcom-5.3.18-150300.59.185.1
* cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-extra-debuginfo-5.3.18-150300.59.185.1
* dtb-renesas-5.3.18-150300.59.185.1
* reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* dtb-lg-5.3.18-150300.59.185.1
* dlm-kmp-64kb-5.3.18-150300.59.185.1
* kernel-64kb-devel-5.3.18-150300.59.185.1
* dtb-mediatek-5.3.18-150300.59.185.1
* dtb-socionext-5.3.18-150300.59.185.1
* dlm-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* dtb-allwinner-5.3.18-150300.59.185.1
* dtb-cavium-5.3.18-150300.59.185.1
* cluster-md-kmp-64kb-5.3.18-150300.59.185.1
* kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.185.1
* dtb-arm-5.3.18-150300.59.185.1
* openSUSE Leap 15.3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Live Patching 15-SP3 (nosrc)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-default-livepatch-devel-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-livepatch-5.3.18-150300.59.185.1
* kernel-livepatch-5_3_18-150300_59_185-default-1-150300.7.3.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
s390x x86_64)
* dlm-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debugsource-5.3.18-150300.59.185.1
* ocfs2-kmp-default-5.3.18-150300.59.185.1
* ocfs2-kmp-default-debuginfo-5.3.18-150300.59.185.1
* dlm-kmp-default-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* gfs2-kmp-default-5.3.18-150300.59.185.1
* cluster-md-kmp-default-debuginfo-5.3.18-150300.59.185.1
* gfs2-kmp-default-debuginfo-5.3.18-150300.59.185.1
* cluster-md-kmp-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-debugsource-5.3.18-150300.59.185.1
* kernel-64kb-devel-5.3.18-150300.59.185.1
* kernel-64kb-debuginfo-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc
x86_64)
* kernel-default-5.3.18-150300.59.185.1
* kernel-preempt-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-obs-build-5.3.18-150300.59.185.1
* kernel-preempt-debugsource-5.3.18-150300.59.185.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* reiserfs-kmp-default-5.3.18-150300.59.185.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-devel-5.3.18-150300.59.185.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-5.3.18-150300.59.185.1
* kernel-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-syms-5.3.18-150300.59.185.1
* kernel-obs-build-debugsource-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* kernel-macros-5.3.18-150300.59.185.1
* kernel-source-5.3.18-150300.59.185.1
* kernel-devel-5.3.18-150300.59.185.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-debugsource-5.3.18-150300.59.185.1
* kernel-64kb-devel-5.3.18-150300.59.185.1
* kernel-64kb-debuginfo-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-obs-build-5.3.18-150300.59.185.1
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* reiserfs-kmp-default-5.3.18-150300.59.185.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-devel-5.3.18-150300.59.185.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-syms-5.3.18-150300.59.185.1
* kernel-obs-build-debugsource-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* kernel-macros-5.3.18-150300.59.185.1
* kernel-source-5.3.18-150300.59.185.1
* kernel-devel-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch nosrc)
* kernel-docs-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 x86_64)
* kernel-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-5.3.18-150300.59.185.1
* kernel-preempt-debugsource-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc s390x)
* kernel-zfcpdump-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (s390x)
* kernel-zfcpdump-debugsource-5.3.18-150300.59.185.1
* kernel-zfcpdump-debuginfo-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
x86_64)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-obs-build-5.3.18-150300.59.185.1
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* reiserfs-kmp-default-5.3.18-150300.59.185.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-devel-5.3.18-150300.59.185.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-syms-5.3.18-150300.59.185.1
* kernel-obs-build-debugsource-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* kernel-macros-5.3.18-150300.59.185.1
* kernel-source-5.3.18-150300.59.185.1
* kernel-devel-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64)
* kernel-preempt-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* kernel-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-5.3.18-150300.59.185.1
* kernel-preempt-debugsource-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc)
* kernel-64kb-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (aarch64)
* kernel-64kb-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-64kb-debugsource-5.3.18-150300.59.185.1
* kernel-64kb-devel-5.3.18-150300.59.185.1
* kernel-64kb-debuginfo-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64)
* kernel-default-5.3.18-150300.59.185.1
* kernel-preempt-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-obs-build-5.3.18-150300.59.185.1
* kernel-preempt-debugsource-5.3.18-150300.59.185.1
* kernel-preempt-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* reiserfs-kmp-default-5.3.18-150300.59.185.1
* reiserfs-kmp-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-devel-5.3.18-150300.59.185.1
* kernel-default-devel-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-preempt-devel-5.3.18-150300.59.185.1
* kernel-preempt-debuginfo-5.3.18-150300.59.185.1
* kernel-syms-5.3.18-150300.59.185.1
* kernel-obs-build-debugsource-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (noarch)
* kernel-macros-5.3.18-150300.59.185.1
* kernel-source-5.3.18-150300.59.185.1
* kernel-devel-5.3.18-150300.59.185.1
* SUSE Enterprise Storage 7.1 (noarch nosrc)
* kernel-docs-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* kernel-default-debugsource-5.3.18-150300.59.185.1
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debugsource-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64)
* kernel-default-5.3.18-150300.59.185.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64)
* kernel-default-base-5.3.18-150300.59.185.1.150300.18.109.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.3.18-150300.59.185.1
* kernel-default-debugsource-5.3.18-150300.59.185.1
## References:
* https://www.suse.com/security/cve/CVE-2022-48985.html
* https://www.suse.com/security/cve/CVE-2022-49006.html
* https://www.suse.com/security/cve/CVE-2022-49010.html
* https://www.suse.com/security/cve/CVE-2022-49011.html
* https://www.suse.com/security/cve/CVE-2022-49019.html
* https://www.suse.com/security/cve/CVE-2022-49021.html
* https://www.suse.com/security/cve/CVE-2022-49022.html
* https://www.suse.com/security/cve/CVE-2022-49029.html
* https://www.suse.com/security/cve/CVE-2022-49031.html
* https://www.suse.com/security/cve/CVE-2022-49032.html
* https://www.suse.com/security/cve/CVE-2023-52524.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://bugzilla.suse.com/show_bug.cgi?id=1154353
* https://bugzilla.suse.com/show_bug.cgi?id=1198778
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1220927
* https://bugzilla.suse.com/show_bug.cgi?id=1231939
* https://bugzilla.suse.com/show_bug.cgi?id=1231940
* https://bugzilla.suse.com/show_bug.cgi?id=1231958
* https://bugzilla.suse.com/show_bug.cgi?id=1231962
* https://bugzilla.suse.com/show_bug.cgi?id=1231991
* https://bugzilla.suse.com/show_bug.cgi?id=1231992
* https://bugzilla.suse.com/show_bug.cgi?id=1231995
* https://bugzilla.suse.com/show_bug.cgi?id=1232006
* https://bugzilla.suse.com/show_bug.cgi?id=1232163
* https://bugzilla.suse.com/show_bug.cgi?id=1232172
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233117
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://jira.suse.com/browse/SLE-8100
1
0
13 Dec '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:4316-1
Release Date: 2024-12-13T15:24:05Z
Rating: important
References:
* bsc#1012628
* bsc#1082555
* bsc#1194869
* bsc#1215199
* bsc#1218644
* bsc#1220355
* bsc#1221309
* bsc#1222423
* bsc#1222587
* bsc#1222590
* bsc#1223112
* bsc#1223656
* bsc#1223733
* bsc#1224429
* bsc#1224518
* bsc#1224548
* bsc#1224948
* bsc#1225713
* bsc#1225725
* bsc#1225730
* bsc#1225742
* bsc#1225764
* bsc#1225768
* bsc#1225813
* bsc#1225903
* bsc#1226130
* bsc#1226748
* bsc#1226872
* bsc#1227726
* bsc#1227842
* bsc#1228430
* bsc#1228850
* bsc#1229165
* bsc#1230231
* bsc#1230557
* bsc#1230558
* bsc#1230733
* bsc#1230807
* bsc#1230817
* bsc#1230827
* bsc#1230971
* bsc#1231076
* bsc#1231114
* bsc#1231182
* bsc#1231453
* bsc#1231465
* bsc#1231630
* bsc#1231920
* bsc#1231930
* bsc#1231946
* bsc#1231952
* bsc#1232096
* bsc#1232103
* bsc#1232104
* bsc#1232157
* bsc#1232165
* bsc#1232166
* bsc#1232198
* bsc#1232201
* bsc#1232207
* bsc#1232208
* bsc#1232224
* bsc#1232258
* bsc#1232264
* bsc#1232272
* bsc#1232318
* bsc#1232335
* bsc#1232357
* bsc#1232358
* bsc#1232361
* bsc#1232366
* bsc#1232367
* bsc#1232368
* bsc#1232371
* bsc#1232374
* bsc#1232385
* bsc#1232386
* bsc#1232387
* bsc#1232396
* bsc#1232413
* bsc#1232416
* bsc#1232436
* bsc#1232442
* bsc#1232446
* bsc#1232483
* bsc#1232494
* bsc#1232498
* bsc#1232499
* bsc#1232500
* bsc#1232704
* bsc#1232757
* bsc#1232823
* bsc#1232860
* bsc#1232869
* bsc#1232870
* bsc#1232873
* bsc#1232876
* bsc#1232877
* bsc#1232878
* bsc#1232880
* bsc#1232881
* bsc#1232884
* bsc#1232885
* bsc#1232887
* bsc#1232888
* bsc#1232890
* bsc#1232892
* bsc#1232894
* bsc#1232896
* bsc#1232897
* bsc#1232905
* bsc#1232907
* bsc#1232914
* bsc#1232919
* bsc#1232925
* bsc#1232926
* bsc#1232928
* bsc#1232935
* bsc#1233029
* bsc#1233032
* bsc#1233035
* bsc#1233036
* bsc#1233041
* bsc#1233044
* bsc#1233049
* bsc#1233050
* bsc#1233051
* bsc#1233056
* bsc#1233057
* bsc#1233061
* bsc#1233062
* bsc#1233063
* bsc#1233065
* bsc#1233067
* bsc#1233070
* bsc#1233073
* bsc#1233074
* bsc#1233088
* bsc#1233091
* bsc#1233092
* bsc#1233097
* bsc#1233100
* bsc#1233103
* bsc#1233104
* bsc#1233105
* bsc#1233106
* bsc#1233107
* bsc#1233108
* bsc#1233110
* bsc#1233111
* bsc#1233113
* bsc#1233114
* bsc#1233115
* bsc#1233117
* bsc#1233119
* bsc#1233123
* bsc#1233125
* bsc#1233127
* bsc#1233129
* bsc#1233130
* bsc#1233132
* bsc#1233135
* bsc#1233176
* bsc#1233179
* bsc#1233185
* bsc#1233188
* bsc#1233189
* bsc#1233191
* bsc#1233193
* bsc#1233197
* bsc#1233201
* bsc#1233203
* bsc#1233204
* bsc#1233205
* bsc#1233206
* bsc#1233207
* bsc#1233208
* bsc#1233209
* bsc#1233210
* bsc#1233211
* bsc#1233212
* bsc#1233216
* bsc#1233217
* bsc#1233219
* bsc#1233226
* bsc#1233238
* bsc#1233241
* bsc#1233244
* bsc#1233253
* bsc#1233255
* bsc#1233293
* bsc#1233298
* bsc#1233305
* bsc#1233320
* bsc#1233350
* bsc#1233443
* bsc#1233452
* bsc#1233453
* bsc#1233454
* bsc#1233456
* bsc#1233457
* bsc#1233458
* bsc#1233460
* bsc#1233462
* bsc#1233463
* bsc#1233464
* bsc#1233465
* bsc#1233468
* bsc#1233471
* bsc#1233476
* bsc#1233478
* bsc#1233479
* bsc#1233481
* bsc#1233484
* bsc#1233485
* bsc#1233487
* bsc#1233490
* bsc#1233491
* bsc#1233523
* bsc#1233524
* bsc#1233540
* bsc#1233547
* bsc#1233548
* bsc#1233550
* bsc#1233552
* bsc#1233553
* bsc#1233554
* bsc#1233555
* bsc#1233557
* bsc#1233560
* bsc#1233561
* bsc#1233564
* bsc#1233566
* bsc#1233567
* bsc#1233568
* bsc#1233570
* bsc#1233572
* bsc#1233573
* bsc#1233577
* bsc#1233580
* bsc#1233640
* bsc#1233641
* bsc#1233642
* bsc#1233721
* bsc#1233754
* bsc#1233756
* bsc#1233769
* bsc#1233771
* bsc#1233977
* bsc#1234009
* bsc#1234011
* bsc#1234012
* bsc#1234025
* bsc#1234039
* bsc#1234040
* bsc#1234041
* bsc#1234042
* bsc#1234043
* bsc#1234044
* bsc#1234045
* bsc#1234046
* bsc#1234072
* bsc#1234078
* bsc#1234081
* bsc#1234083
* bsc#1234085
* bsc#1234087
* bsc#1234093
* bsc#1234098
* bsc#1234108
* bsc#1234121
* bsc#1234223
* jsc#PED-11316
* jsc#PED-11442
* jsc#PED-11580
* jsc#PED-9943
Cross-References:
* CVE-2023-52778
* CVE-2023-52920
* CVE-2023-52921
* CVE-2023-52922
* CVE-2024-26596
* CVE-2024-26703
* CVE-2024-26741
* CVE-2024-26782
* CVE-2024-26864
* CVE-2024-26953
* CVE-2024-27017
* CVE-2024-27407
* CVE-2024-35888
* CVE-2024-36000
* CVE-2024-36031
* CVE-2024-36484
* CVE-2024-36883
* CVE-2024-36886
* CVE-2024-36905
* CVE-2024-36920
* CVE-2024-36927
* CVE-2024-36954
* CVE-2024-36968
* CVE-2024-38589
* CVE-2024-40914
* CVE-2024-41023
* CVE-2024-42102
* CVE-2024-44995
* CVE-2024-46680
* CVE-2024-46681
* CVE-2024-46765
* CVE-2024-46788
* CVE-2024-46800
* CVE-2024-46828
* CVE-2024-46845
* CVE-2024-47666
* CVE-2024-47679
* CVE-2024-47701
* CVE-2024-47703
* CVE-2024-49868
* CVE-2024-49884
* CVE-2024-49888
* CVE-2024-49899
* CVE-2024-49905
* CVE-2024-49908
* CVE-2024-49911
* CVE-2024-49912
* CVE-2024-49921
* CVE-2024-49922
* CVE-2024-49923
* CVE-2024-49925
* CVE-2024-49933
* CVE-2024-49934
* CVE-2024-49944
* CVE-2024-49945
* CVE-2024-49952
* CVE-2024-49968
* CVE-2024-49975
* CVE-2024-49976
* CVE-2024-49983
* CVE-2024-49987
* CVE-2024-49989
* CVE-2024-50003
* CVE-2024-50004
* CVE-2024-50006
* CVE-2024-50009
* CVE-2024-50012
* CVE-2024-50014
* CVE-2024-50026
* CVE-2024-50067
* CVE-2024-50082
* CVE-2024-50084
* CVE-2024-50087
* CVE-2024-50088
* CVE-2024-50089
* CVE-2024-50093
* CVE-2024-50095
* CVE-2024-50096
* CVE-2024-50098
* CVE-2024-50099
* CVE-2024-50100
* CVE-2024-50101
* CVE-2024-50102
* CVE-2024-50103
* CVE-2024-50108
* CVE-2024-50110
* CVE-2024-50115
* CVE-2024-50116
* CVE-2024-50117
* CVE-2024-50121
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50128
* CVE-2024-50130
* CVE-2024-50131
* CVE-2024-50134
* CVE-2024-50135
* CVE-2024-50136
* CVE-2024-50138
* CVE-2024-50139
* CVE-2024-50141
* CVE-2024-50145
* CVE-2024-50146
* CVE-2024-50147
* CVE-2024-50148
* CVE-2024-50150
* CVE-2024-50153
* CVE-2024-50154
* CVE-2024-50155
* CVE-2024-50156
* CVE-2024-50157
* CVE-2024-50158
* CVE-2024-50159
* CVE-2024-50160
* CVE-2024-50166
* CVE-2024-50167
* CVE-2024-50169
* CVE-2024-50171
* CVE-2024-50172
* CVE-2024-50175
* CVE-2024-50176
* CVE-2024-50177
* CVE-2024-50179
* CVE-2024-50180
* CVE-2024-50181
* CVE-2024-50182
* CVE-2024-50183
* CVE-2024-50184
* CVE-2024-50186
* CVE-2024-50187
* CVE-2024-50188
* CVE-2024-50189
* CVE-2024-50192
* CVE-2024-50194
* CVE-2024-50195
* CVE-2024-50196
* CVE-2024-50198
* CVE-2024-50200
* CVE-2024-50201
* CVE-2024-50205
* CVE-2024-50208
* CVE-2024-50209
* CVE-2024-50210
* CVE-2024-50215
* CVE-2024-50216
* CVE-2024-50218
* CVE-2024-50221
* CVE-2024-50224
* CVE-2024-50225
* CVE-2024-50228
* CVE-2024-50229
* CVE-2024-50230
* CVE-2024-50231
* CVE-2024-50232
* CVE-2024-50233
* CVE-2024-50234
* CVE-2024-50235
* CVE-2024-50236
* CVE-2024-50237
* CVE-2024-50240
* CVE-2024-50245
* CVE-2024-50246
* CVE-2024-50248
* CVE-2024-50249
* CVE-2024-50250
* CVE-2024-50252
* CVE-2024-50255
* CVE-2024-50257
* CVE-2024-50261
* CVE-2024-50264
* CVE-2024-50265
* CVE-2024-50267
* CVE-2024-50268
* CVE-2024-50269
* CVE-2024-50271
* CVE-2024-50273
* CVE-2024-50274
* CVE-2024-50275
* CVE-2024-50276
* CVE-2024-50279
* CVE-2024-50282
* CVE-2024-50287
* CVE-2024-50289
* CVE-2024-50290
* CVE-2024-50292
* CVE-2024-50295
* CVE-2024-50296
* CVE-2024-50298
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53042
* CVE-2024-53043
* CVE-2024-53045
* CVE-2024-53048
* CVE-2024-53051
* CVE-2024-53052
* CVE-2024-53055
* CVE-2024-53056
* CVE-2024-53058
* CVE-2024-53059
* CVE-2024-53060
* CVE-2024-53061
* CVE-2024-53063
* CVE-2024-53066
* CVE-2024-53068
* CVE-2024-53072
* CVE-2024-53074
* CVE-2024-53076
* CVE-2024-53079
* CVE-2024-53081
* CVE-2024-53082
* CVE-2024-53085
* CVE-2024-53088
* CVE-2024-53093
* CVE-2024-53094
* CVE-2024-53095
* CVE-2024-53096
* CVE-2024-53100
* CVE-2024-53101
* CVE-2024-53104
* CVE-2024-53106
* CVE-2024-53108
* CVE-2024-53110
* CVE-2024-53112
* CVE-2024-53114
* CVE-2024-53121
* CVE-2024-53138
CVSS scores:
* CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-52920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41023 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-42102 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
* CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46788 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47666 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47703 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49888 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49933 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49968 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49987 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49989 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50003 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50128 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50134 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50135 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50136 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50139 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50148 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50150 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50153 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50160 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50169 ( SUSE ): 0.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50171 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50177 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50180 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50181 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50183 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50208 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50210 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50228 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50229 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50231 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50232 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50233 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50236 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50248 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50250 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50252 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50257 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53100 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53101 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53110 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves 228 vulnerabilities, contains four features and has 44
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948).
* CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in
precision tracking (bsc#1232823).
* CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non-
DSA netdevice events (bsc#1220355).
* CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after
check_estalblished() (bsc#1222587).
* CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
* CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
(bsc#1223656).
* CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink
dump (bsc#1223733).
* CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head
(bsc#1224518).
* CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge
(bsc#1224548).
* CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
* CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
* CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
(bsc#1225742).
* CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb()
(bsc#1225813).
* CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
(bsc#1225764).
* CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()
(bsc#1226130).
* CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).
* CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio
(bsc#1227842).
* CVE-2024-41023: sched/deadline: Fix task_struct reference leak
(bsc#1228430).
* CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in
wb_dirty_limits(), again" (bsc#1233132).
* CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
resetting (bsc#1230231).
* CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing
driver (bsc#1230557).
* CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
* CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807).
* CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).
* CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput()
(bsc#1231930).
* CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath
the filesystem (bsc#1231920).
* CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946).
* CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a
new trasacntion (bsc#1232272).
* CVE-2024-49888: bpf: Fix a sdiv overflow issue (bsc#1232208).
* CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1
(bsc#1232358).
* CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in
dcn20_set_output_transfer_func (bsc#1232366).
* CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in
'planes_changed_for_existing_stream' (bsc#1232367).
* CVE-2024-49921: drm/amd/display: Check null pointers before used
(bsc#1232371).
* CVE-2024-49922: drm/amd/display: Check null pointers before using them
(bsc#1232374).
* CVE-2024-49923: drm/amd/display: Pass non-null to
dcn20_validate_apply_pipe_split_flags (bsc#1232361).
* CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
(bsc#1232224)
* CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
* CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
dentry.d_name.name (bsc#1232387).
* CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in
sctp_listen_start (bsc#1232166).
* CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
associated structure (bsc#1232165).
* CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption
(bsc#1232157).
* CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted
with siphash (bsc#1232264).
* CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
double-free (bsc#1232096).
* CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...)
(bsc#1232258).
* CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
unload (bsc#1232483).
* CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT
monitor (bsc#1232385).
* CVE-2024-50004: drm/amd/display: update DML2 policy
EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396).
* CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate()
(bsc#1232442).
* CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return
value (bsc#1232318).
* CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node
(bsc#1232386).
* CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path
(bsc#1232446).
* CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
rq_qos_wake_function race (bsc#1232500).
* CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in
vcap_api_encode_rule_test() (bsc#1232494).
* CVE-2024-50087: btrfs: fix uninitialized pointer free on
read_alloc_one_name() error (bsc#1232499).
* CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref()
(bsc#1232498).
* CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
(bsc#1232881).
* CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
(bsc#1232885).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
* CVE-2024-50130: netfilter: bpf: must hold reference on net namespace
(bsc#1232894).
* CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
* CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062).
* CVE-2024-50145: octeon_ep: add SKB allocation failures handling in
__octep_oq_process_rx() (bsc#1233044).
* CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
target_alloc_device() (bsc#1233061).
* CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink()
(bsc#1233070).
* CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices
(bsc#1233050).
* CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
(bsc#1233049).
* CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320).
* CVE-2024-50171: net: systemport: fix potential memory leak in
bcm_sysport_xmit() (bsc#1233057).
* CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1
(bsc#1233115).
* CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
map (bsc#1233129).
* CVE-2024-50184: virtio_pmem: Check device status before requesting flush
(bsc#1233135).
* CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails
(bsc#1233110).
* CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE
(bsc#1233106).
* CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193).
* CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204).
* CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
flag (bsc#1233206).
* CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203).
* CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207).
* CVE-2024-50248: ntfs3: add bounds checking to mi_enum_attr() (bsc#1233219).
* CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks
(bsc#1233226).
* CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote
IPv6 address (bsc#1233201).
* CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244).
* CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
packet (bsc#1233253).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
* CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
the list (bsc#1233462).
* CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).
* CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps
(bsc#1233464).
* CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb
(bsc#1233465).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
* CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single
(bsc#1233484).
* CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver
(bsc#1233485).
* CVE-2024-50298: net: enetc: allocate vf_state during PF probes
(bsc#1233487).
* CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
ip_tunnel_init_flow() (bsc#1233540).
* CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523).
* CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM
(bsc#1233721).
* CVE-2024-53051: drm/i915/hdcp: Add encoder check in
intel_hdcp_get_capability (bsc#1233547).
* CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction
(bsc#1233550).
* CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in
mtk_crtc_destroy() (bsc#1233568).
* CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged
SKB data (bsc#1233552).
* CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
(bsc#1233570).
* CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573).
* CVE-2024-53095: smb: client: Fix use-after-free of network namespace
(bsc#1233642).
* CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).
* CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active
(bsc#1234078).
* CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting
(bsc#1234223).
The following non-security bugs were fixed:
* ACPI: CPPC: Fix _CPC register setting issue (git-fixes).
* ALSA: 6fire: Release resources at card release (git-fixes).
* ALSA: ac97: bus: Fix the mistake in the comment (git-fixes).
* ALSA: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
* ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-
fixes).
* ALSA: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes).
* ALSA: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
* ALSA: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318
(git-fixes).
* ALSA: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG)
(stable-fixes).
* ALSA: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298).
* ALSA: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable-
fixes).
* ALSA: hda/realtek: Enable speaker pins for Medion E15443 platform
(bsc#1233298).
* ALSA: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max
(bsc#1233298).
* ALSA: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes).
* ALSA: hda/realtek: Update ALC225 depop procedure (git-fixes).
* ALSA: hda/realtek: Update ALC256 depop procedure (git-fixes).
* ALSA: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-
fixes).
* ALSA: hda: Poll jack events for LS7A HD-Audio (stable-fixes).
* ALSA: hda: Show the codec quirk info at probing (stable-fixes).
* ALSA: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes).
* ALSA: pcm: Add sanity NULL check for the default mmap fault handler (stable-
fixes).
* ALSA: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes).
* ALSA: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
* ALSA: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes).
* ALSA: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes).
* ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes).
* ALSA: usb-audio: Fix out of bounds reads when finding clock sources (stable-
fixes).
* ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox
devices (git-fixes).
* ALSA: usb-audio: Make mic volume workarounds globally applicable (stable-
fixes).
* ALSA: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl
(stable-fixes).
* ALSA: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes).
* ALSA: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
* ASoC: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable-
fixes).
* ASoC: SOF: Add i2s bt dai configuration support for AMD platforms
(bsc#1233305).
* ASoC: SOF: Add support for configuring PDM interface from topology
(bsc#1233305).
* ASoC: SOF: Deprecate invalid enums in IPC3 (bsc#1233305).
* ASoC: SOF: IPC4: get pipeline priority from topology (bsc#1233305).
* ASoC: SOF: IPC4: synchronize fw_config_params with fw definitions
(bsc#1233305).
* ASoC: SOF: Refactor sof_i2s_tokens reading to update acpbt dai
(bsc#1233305).
* ASoC: SOF: Rename amd_bt sof_dai_type (bsc#1233305).
* ASoC: SOF: Wire up buffer flags (bsc#1233305).
* ASoC: SOF: add alignment for topology header file struct definition
(bsc#1233305).
* ASoC: SOF: align topology header file with sof topology header
(bsc#1233305).
* ASoC: SOF: ipc3-topology: Convert the topology pin index to ALH dai index
(git-fixes).
* ASoC: SOF: ipc3-topology: fix resource leaks in
sof_ipc3_widget_setup_comp_dai() (git-fixes).
* ASoC: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305).
* ASoC: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305).
* ASoC: SOF: ipc4-mtrace: move debug slot related definitions to header.h
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Add deep buffer size to debug prints
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Add definition for generic switch/enum control
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Add module ID print during module set up
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Helper to find an swidget by module/instance id
(bsc#1233305).
* ASoC: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA
(bsc#1233305).
* ASoC: SOF: ipc4-topology: change chain_dma handling in dai_config
(bsc#1233305).
* ASoC: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format
(bsc#1233305).
* ASoC: SOF: ipc4-topology: set config_length based on device_count
(bsc#1233305).
* ASoC: SOF: ipc4: Add data struct for module notification message from
firmware (bsc#1233305).
* ASoC: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE
(bsc#1233305).
* ASoC: SOF: sof-client-probes-ipc4: Set param_size extension bits (git-
fixes).
* ASoC: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305).
* ASoC: SOF: topology: dynamically allocate and store DAI widget->private
(bsc#1233305).
* ASoC: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes).
* ASoC: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
* ASoC: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes).
* ASoC: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6
(stable-fixes).
* ASoC: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes).
* ASoC: audio-graph-card2: Purge absent supplies for device tree nodes
(stable-fixes).
* ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
(git-fixes).
* ASoC: fsl_micfil: Add sample rate constraint (stable-fixes).
* ASoC: fsl_micfil: fix regmap_write_bits usage (git-fixes).
* ASoC: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes).
* ASoC: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes).
* ASoC: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable-
fixes).
* ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-
fixes).
* ASoC: stm: Prevent potential division by zero in stm32_sai_get_clk_div()
(stable-fixes).
* ASoC: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate()
(stable-fixes).
* ASoC: tas2781: Add new driver version for tas2563 & tas2781 qfn chip
(stable-fixes).
* Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-
fixes).
* Bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes).
* Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test
(bsc#1230557)
* Bluetooth: fix use-after-free in device_for_each_child() (git-fixes).
* Bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes).
* Documentation: kgdb: Correct parameter error (git-fixes).
* Drop OCFS2 patch causing a regression (bsc#1233255)
* HID: core: zero-initialize the report buffer (git-fixes).
* HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-
fixes).
* HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-
fixes).
* HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
(stable-fixes).
* HID: multitouch: Add support for B2402FVA track point (stable-fixes).
* HID: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-
fixes).
* HID: wacom: fix when get product name maybe null pointer (git-fixes).
* Input: hideep - add missing dependency on REGMAP_I2C (git-fixes).
* Input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes).
* Input: xpad - add GameSir T4 Kaleid Controller support (git-fixes).
* Input: xpad - add GameSir VID for Xbox One controllers (git-fixes).
* Input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git-
fixes).
* Input: xpad - add support for MSI Claw A1M (git-fixes).
* Input: xpad - add support for Machenike G5 Pro Controller (git-fixes).
* Input: xpad - fix support for some third-party controllers (git-fixes).
* Input: xpad - sort xpad_device by vendor and product ID (git-fixes).
* Input: xpad - spelling fixes for "Xbox" (git-fixes).
* KVM: PPC: Book3S HV: Avoid returning to nested hypervisor on pending
doorbells (bsc#1215199).
* KVM: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests
(bsc#1215199).
* KVM: PPC: Book3S HV: remove unused varible (bsc#1194869).
* KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests
(bsc#1232207).
* KVM: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207).
* Move kabi netfilter fix into patches.kabi
* Move upstreamed crypto patches into sorted section
* Move upstreamed patches into sorted section
* NFS: remove revoked delegation from server's delegation list (git-fixes).
* PCI: Add T_PVPERL macro (git-fixes).
* PCI: Fix reset_method_store() memory leak (git-fixes).
* PCI: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf()
(git-fixes).
* PCI: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds
(git-fixes).
* PCI: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
* PCI: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible
(git-fixes).
* PCI: rockchip-ep: Fix address translation unit programming (git-fixes).
* RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
* RDMA/hns: Add mutex_destroy() (git-fixes)
* RDMA/hns: Disassociate mmap pages for all uctx when HW is being reset (git-
fixes)
* RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
* RDMA/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci
(git-fixes)
* RDMA/hns: Fix cpu stuck caused by printings during reset (git-fixes)
* RDMA/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
* RDMA/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
* RDMA/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
* RDMA/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes)
* RDMA/hns: Use macro instead of magic number (git-fixes)
* RDMA/mlx5: Move events notifier registration to be after device registration
(git-fixes)
* RDMA/rxe: Fix the qp flush warnings in req (git-fixes)
* RDMA/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
* RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes)
* Revert "KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs to L1"
(bsc#1215199).
* Revert "RDMA/core: Fix ENODEV error for iWARP test over vlan" (git-fixes)
* Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline"
(bsc#1234108).
* Revert "cpufreq: brcmstb-avs-cpufreq: Fix initial command check" (stable-
fixes).
* Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git-
fixes).
* Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git-
fixes).
* SUNRPC: Remove BUG_ON call sites (git-fixes).
* USB: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
* USB: chaoskey: fail open after removal (git-fixes).
* USB: gadget: dummy-hcd: Fix "task hung" problem (git-fixes).
* USB: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-
fixes).
* USB: serial: io_edgeport: fix use after free in debug printk (git-fixes).
* USB: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
* USB: serial: option: add Quectel RG650V (stable-fixes).
* USB: serial: qcserial: add support for Sierra Wireless EM86xx (stable-
fixes).
* Update config files (bsc#1218644).
* Update config files. Enabled IDPF for ARM64 (bsc#1221309)
* accel: Use XArray instead of IDR for minors (jsc#PED-11580).
* acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block()
(git-fixes).
* ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
* add bugreference to a hv_netvsc patch (bsc#1232413).
* aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704).
* amd-pstate: Set min_perf to nominal_perf for active mode performance gov
(git-fixes).
* apparmor: fix 'Do simple duplicate message elimination' (git-fixes).
* apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes).
* apparmor: use kvfree_sensitive to free data->data (git-fixes).
* arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git-
fixes)
* arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes)
* arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes)
* arm64: dts: imx93: add nvmem property for eqos (git-fixes)
* arm64: dts: imx93: add nvmem property for fec1 (git-fixes)
* arm64: dts: imx93: add ocotp node (git-fixes)
* arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes)
* arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git-
fixes)
* arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git-
fixes)
* arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes)
* arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git-
fixes)
* arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes)
* arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes)
* arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes)
* arm64: dts: rockchip: remove num-slots property from (git-fixes)
* arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git-
fixes)
* arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
* arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-
fixes)
* arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
* arm64: tegra: Move AGX Orin nodes to correct location (git-fixes)
* arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-
fixes)
* bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes)
* bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes)
* bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git-
fixes).
* bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes).
* btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193)
* can: c_can: c_can_handle_bus_err(): update statistics if skb allocation
fails (git-fixes).
* can: c_can: fix {rx,tx}_errors statistics (git-fixes).
* can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes).
* can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes).
* can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes).
* can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).
* can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
* can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-
fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6
(git-fixes).
* can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when
switching CAN modes (git-fixes).
* can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
(git-fixes).
* can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
* cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
* clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes).
* clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes).
* clk: imx: clk-scu: fix clk enable state save and restore (git-fixes).
* clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes).
* clk: imx: fracn-gppll: fix pll power up (git-fixes).
* clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes).
* clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes).
* clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes).
* clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes).
* clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes).
* clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes).
* comedi: Flush partial mappings in error case (git-fixes).
* cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git-
fixes).
* cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git-
fixes).
* cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes).
* cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes).
* cpufreq: loongson2: Unregister platform_driver on failure (git-fixes).
* cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power()
(git-fixes).
* crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704).
* crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes).
* crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
* crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
* crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
* crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-
fixes).
* crypto: cavium - Fix the if condition to exit loop after timeout (git-
fixes).
* crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
(git-fixes).
* crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return
-EBUSY (git-fixes).
* crypto: qat - remove check after debugfs_create_dir() (git-fixes).
* crypto: qat - remove faulty arbiter config reset (git-fixes).
* crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes).
* crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
* cxl: downgrade a warning message to debug level in
cxl_probe_component_regs() (bsc#1229165).
* dma-fence: Fix reference leak on fence merge failure path (git-fixes).
* dma-fence: Use kernel's sort for merging fences (git-fixes).
* doc: rcu: update printed dynticks counter bits (git-fixes).
* drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend()
(git-fixes).
* drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes).
* drm/amd/display: Fix brightness level not retained over reboot (git-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in
dcn20_program_pipe (git-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp
(git-fixes).
* drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes).
* drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
* drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-
fixes).
* drm/amdgpu: Adjust debugfs register access permissions (stable-fixes).
* drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes).
* drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes).
* drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-
fixes).
* drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes).
* drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-
fixes).
* drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes).
* drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes).
* drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: tc358767: Fix link properties discovery (git-fixes).
* drm/bridge: tc358768: Fix DSI command tx (git-fixes).
* drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-
fixes).
* drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes).
* drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/mediatek: Fix child node refcount handling in early exit (git-fixes).
* drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-
fixes).
* drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
(git-fixes).
* drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes).
* drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes).
* drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes).
* drm/msm/gpu: Check the status of registration to PM QoS (git-fixes).
* drm/msm: Fix some typos in comment (git-fixes).
* drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes).
* drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
* drm/omap: Fix possible NULL dereference (git-fixes).
* drm/panfrost: Add missing OPP table refcnt decremental (git-fixes).
* drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
* drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
* drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes).
* drm/sti: avoid potential dereference of error pointers (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_gdp_atomic_check (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_hqvdp_atomic_check (git-fixes).
* drm/v3d: Address race-condition in MMU flush (git-fixes).
* drm/v3d: Enable Performance Counters before clearing them (git-fixes).
* drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git-
fixes).
* drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes).
* drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes).
* drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes).
* drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
* drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-
fixes).
* drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-
fixes).
* drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes).
* drm/vmwgfx: Limit display layout ioctl array size to
VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
* drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).
* drm: Use XArray instead of IDR for minors (jsc#PED-11580).
* drm: use ATOMIC64_INIT() for atomic64_t (git-fixes).
* drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes).
* drm: zynqmp_kms: Unplug DRM device before removal (git-fixes).
* e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes).
* efi/libstub: Free correct pointer on failure (git-fixes).
* efi/libstub: fix efi_parse_options() ignoring the default command line (git-
fixes).
* efi/libstub: zboot.lds: Discard .discard sections (stable-fixes).
* efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
* ext4: fix unttached inode after power cut with orphan file feature enabled
(bsc#1234009).
* f2fs: get out of a repeat loop when getting a locked data page
(bsc#1234011).
* fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git-
fixes).
* firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git-
fixes).
* firmware: google: Unregister driver_info on failure (git-fixes).
* firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git-
fixes).
* fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207)
* fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207)
* fs/ntfs3: Sequential field availability check in mi_enum_attr()
(bsc#1233207)
* fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes).
* goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
* gpio: exar: set value when external pull-up or pull-down is present (git-
fixes).
* gpio: zevio: Add missed label initialisation (git-fixes).
* hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-
fixes).
* hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git-
fixes).
* hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
* i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set
(git-fixes).
* i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-
fixes).
* i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).
* i40e: fix race condition by adding filter's intermediate sync state (git-
fixes).
* iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
* igb: Disable threaded IRQ for igb_msix_other (git-fixes).
* iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes).
* iio: accel: kx022a: Fix raw read format (git-fixes).
* iio: adc: ad7606: Fix typo in the driver name (git-fixes).
* iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
* iio: gts: Fix uninitialized symbol 'ret' (git-fixes).
* iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes).
* iio: light: al3010: Fix an error handling path in al3010_probe() (git-
fixes).
* ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes).
* initramfs: avoid filename buffer overrun (bsc#1232436).
* intel_idle: add Granite Rapids Xeon support (bsc#1231630).
* intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630).
* io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes).
* io_uring/sqpoll: close race on waiting for sqring entries (git-fixes).
* irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
* jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042).
* jbd2: avoid infinite transaction commit loop (bsc#1234039).
* jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043).
* jbd2: avoid mount failed when commit block is partial submitted
(bsc#1234040).
* jbd2: correct the printing of write_flags in jbd2_write_superblock()
(bsc#1234045).
* jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042).
* jbd2: fix potential data lost in recovering journal raced with synchronizing
fs bdev (bsc#1234044).
* jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046).
* jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041).
* jbd2: precompute number of transaction descriptor blocks (bsc#1234042).
* kABI workaround for ASoC SOF (bsc#1233305).
* kABI: Restore exported __arm_smccc_sve_check (git-fixes)
* kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-
fixes kabi).
* kasan: move checks to do_strncpy_from_user (git-fixes).
* kernel-binary: Enable livepatch package only when livepatch is enabled
Otherwise the filelist may be empty failing the build (bsc#1218644).
* kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y
(git-fixes).
* leds: lp55xx: Remove redundant test for invalid channel number (git-fixes).
* lib: string_helpers: silence snprintf() output truncation warning (git-
fixes).
* mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes).
* maple_tree: fix alloc node fail issue (git-fixes).
* maple_tree: refine mas_store_root() on storing NULL (git-fixes).
* media: adv7604: prevent underflow condition when reporting colorspace (git-
fixes).
* media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* media: amphion: Set video drvdata before register video device (git-fixes).
* media: ar0521: do not overflow when checking PLL values (git-fixes).
* media: atomisp: Add check for rgby_data memory allocation failure (git-
fixes).
* media: cx24116: prevent overflows on SNR calculus (git-fixes).
* media: dvb_frontend: do not play tricks with underflow values (git-fixes).
* media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable-
fixes).
* media: dvbdev: prevent the risk of out of memory access (git-fixes).
* media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git-
fixes).
* media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).
* media: i2c: tc358743: Fix crash in the probe error path when using polling
(git-fixes).
* media: imx-jpeg: Ensure power suppliers be suspended before detach them
(git-fixes).
* media: imx-jpeg: Set video drvdata before register video device (git-fixes).
* media: mantis: remove orphan mantis_core.h (git-fixes).
* media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes).
* media: platform: allegro-dvt: Fix possible memory leak in
allocate_buffers_internal() (git-fixes).
* media: platform: exynos4-is: Fix an OF node reference leak in
fimc_md_is_isp_available (git-fixes).
* media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
* media: s5p-jpeg: prevent buffer overflows (git-fixes).
* media: stb0899_algo: initialize cfr before using it (git-fixes).
* media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes).
* media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes).
* media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in
uvc_parse_format (git-fixes).
* media: uvcvideo: Stop stream during unregister (git-fixes).
* media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
* media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
* media: vb2: Fix comment (git-fixes).
* media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes).
* mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes).
* mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git-
fixes).
* minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes).
* misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
* mlxbf_gige: disable RX filters until RX path initialized (git-fixes).
* mm/hugetlb: fix nodes huge page allocation when there are surplus pages
(bsc#1234012).
* mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git-
fixes).
* mm: move dummy_vm_ops out of a header (git-fixes prerequisity).
* mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes).
* mm: refactor map_deny_write_exec() (git-fixes).
* mm: resolve faulty mmap_region() error path behaviour (git-fixes).
* mm: unconditionally close VMAs on error (git-fixes).
* mmc: core: Further prevent card detect during shutdown (git-fixes).
* mmc: mmc_spi: drop buggy snprintf() (git-fixes).
* mmc: sunxi-mmc: Fix A100 compatible description (git-fixes).
* modpost: remove incorrect code in do_eisa_entry() (git-fixes).
* mtd: rawnand: atmel: Fix possible memory leak (git-fixes).
* mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes).
* net: mdio-ipq4019: add missing error check (git-fixes).
* net: phy: dp83822: Fix reset pin definitions (git-fixes).
* net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes).
* net: relax socket state check at accept time (git-fixes).
* net: usb: lan78xx: Fix double free issue with interrupt buffer allocation
(git-fixes).
* net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
(git-fixes).
* net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
configuration (git-fixes).
* net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
* net: wwan: fix global oob in wwan_rtnl_policy (git-fixes).
* net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git-
fixes).
* net: xfrm: preserve kabi for xfrm_state (bsc#1233754).
* netdevsim: copy addresses for both in and out paths (git-fixes).
* netfilter: nf_tables: missing iterator type in lookup walk (git-fixes).
* nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
* nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes).
* nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121).
* nilfs2: fix potential deadlock with newly created symlinks (git-fixes).
* nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes).
* nouveau: fw: sync dma after setup is called (git-fixes).
* nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes).
* ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207)
* nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
* nvme-loop: flush off pending I/O while shutting down loop controller (git-
fixes).
* nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
* nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
* nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes).
* nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes).
* ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes).
* ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove() (git-fixes).
* ocfs2: uncache inode which has failed entering the group (git-fixes).
* of: Add cleanup.h based auto release via __free(device_node) markings
(bsc#1232386)
* pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes).
* pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes).
* pinctrl: zynqmp: drop excess struct member description (git-fixes).
* platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-
fixes).
* platform/x86/amd/pmc: Detect when STB is not available (git-fixes).
* platform/x86: panasonic-laptop: Return errno correctly in show callback
(git-fixes).
* posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
* power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
* power: supply: core: Remove might_sleep() from power_supply_put() (git-
fixes).
* power: supply: rt9471: Fix wrong WDT function regfield declaration (git-
fixes).
* power: supply: rt9471: Use IC status regfield to report real charger status
(git-fixes).
* powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0
(bsc#1215199).
* powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
* powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init()
(bsc#1215199).
* powerpc/fadump: Refactor and prepare fadump_cma_init for late init
(bsc#1215199).
* powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
* powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
* powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
* powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).
* powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
* powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector
(bsc#1194869).
* powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
* powerpc/pseries: Use correct data types from pseries_hp_errorlog struct
(bsc#1215199).
* powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199).
* pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes).
* regmap: detach regmap from dev on regmap_exit (git-fixes).
* regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes).
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation. (bsc#1218644)
* rtc: ab-eoz9: do not fail temperature reads on undervoltage notification
(git-fixes).
* rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
* rtc: bbnsm: add remove hook (git-fixes).
* rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-
fixes).
* rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes).
* rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
* scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git-
fixes).
* scsi: Remove scsi device no_start_on_resume flag (git-fixes).
* scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
* scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes).
* scsi: core: Disable CDL by default (git-fixes).
* scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes).
* scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
* scsi: core: Handle devices which return an unusually large VPD page count
(git-fixes).
* scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
* scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes).
* scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
* scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes).
* scsi: libsas: Fix exp-attached device scan after probe failure scanned in
again after probe failed (git-fixes).
* scsi: libsas: Fix the failure of adding phy with zero-address to port (git-
fixes).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241 jsc#PED-9943).
* scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
* scsi: mac_scsi: Refactor polling loop (git-fixes).
* scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
* scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes).
* scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings
(git-fixes).
* scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
* scsi: mpi3mr: Validate SAS port assignments (git-fixes).
* scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes).
* scsi: pm80xx: Set phy->enable_completion only when we wait for it (git-
fixes).
* scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
* scsi: scsi_transport_fc: Allow setting rport state to current state (git-
fixes).
* scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git-
fixes).
* scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
* scsi: smartpqi: correct stream detection (git-fixes).
* scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-
fixes).
* scsi: spi: Fix sshdr use (git-fixes).
* scsi: sr: Fix unintentional arithmetic wraparound (git-fixes).
* scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
* security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
* serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
* signal: Replace BUG_ON()s (bsc#1234093).
* soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git-
fixes).
* soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git-
fixes).
* soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* spi: Fix acpi deferred irq probe (git-fixes).
* spi: atmel-quadspi: Fix register name in verbose logging function (git-
fixes).
* spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes).
* spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes).
* tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes).
* thermal: core: Initialize thermal zones before registering them (git-fixes).
* thermal: int3400: Fix reading of current_uuid for active policy (git-fixes).
* thermal: intel: int340x: processor: Fix warning during module unload (git-
fixes).
* thunderbolt: Honor TMU requirements in the domain when setting TMU mode
(stable-fixes).
* tools/lib/thermal: Fix sampling handler context ptr (git-fixes).
* tools/power turbostat: Fix trailing '\n' parsing (git-fixes).
* tools/power turbostat: Increase the limit for fd opened (bsc#1233119).
* tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
* tpm: fix signed/unsigned bug when checking event logs (git-fixes).
* tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes).
* u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file
(git-fixes).
* ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
* unicode: Fix utf8_load() error path (git-fixes).
* usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing
logic (git-fixes).
* usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
* usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
* usb: ehci-spear: fix call balance of sehci clk handling routines (git-
fixes).
* usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable-
fixes).
* usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes).
* usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git-
fixes).
* usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes).
* usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
* usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
(git-fixes).
* usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
(git-fixes).
* usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
* usb: yurex: make waiting on yurex_write interruptible (git-fixes).
* vsock: Update msg_count on read_skb() (git-fixes).
* watchdog: apple: Actually flush writes after requesting watchdog restart
(git-fixes).
* watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).
* watchdog: rti: of: honor timeout-sec property (git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
(git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
(git-fixes).
* wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git-
fixes).
* wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes).
* wifi: ath12k: fix crash when unbinding (git-fixes).
* wifi: ath12k: fix warning when unbinding (git-fixes).
* wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes).
* wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
(git-fixes).
* wifi: brcmfmac: release 'root' node in all execution paths (git-fixes).
* wifi: cw1200: Fix potential NULL dereference (git-fixes).
* wifi: iwlegacy: Clear stale interrupts before resuming device (stable-
fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan() (git-fixes).
* wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: wfx: Fix error handling in wfx_core_init() (git-fixes).
* x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443).
* x86/microcode/intel: Remove unnecessary cache writeback and invalidation
(git-fixes).
* x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes).
* x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes).
* x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes).
* x86/tdx: Enable CPU topology enumeration (git-fixes).
* x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes).
* x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes).
* x86/traps: move kmsan check after instrumentation_begin (git-fixes).
* x86: Increase brk randomness entropy for 64-bit systems (git-fixes).
* x86: fix off-by-one in access_ok() (git-fixes).
* xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754).
* xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754).
* drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).
* accel: Use XArray instead of IDR for minors (jsc#PED-11580).
* drm: Use XArray instead of IDR for minors (jsc#PED-11580).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241 jsc#PED-9943).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4316=1 openSUSE-SLE-15.6-2024-4316=1
* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-4316=1
## Package List:
* openSUSE Leap 15.6 (aarch64 x86_64)
* kselftests-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* gfs2-kmp-azure-6.4.0-150600.8.20.1
* reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-extra-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-debuginfo-6.4.0-150600.8.20.1
* kselftests-kmp-azure-6.4.0-150600.8.20.1
* kernel-syms-azure-6.4.0-150600.8.20.1
* kernel-azure-optional-6.4.0-150600.8.20.1
* gfs2-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* ocfs2-kmp-azure-6.4.0-150600.8.20.1
* ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-devel-6.4.0-150600.8.20.1
* kernel-azure-optional-debuginfo-6.4.0-150600.8.20.1
* reiserfs-kmp-azure-6.4.0-150600.8.20.1
* cluster-md-kmp-azure-6.4.0-150600.8.20.1
* kernel-azure-debugsource-6.4.0-150600.8.20.1
* dlm-kmp-azure-6.4.0-150600.8.20.1
* dlm-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-extra-6.4.0-150600.8.20.1
* cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-devel-debuginfo-6.4.0-150600.8.20.1
* openSUSE Leap 15.6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.20.1
* openSUSE Leap 15.6 (x86_64)
* kernel-azure-vdso-6.4.0-150600.8.20.1
* kernel-azure-vdso-debuginfo-6.4.0-150600.8.20.1
* openSUSE Leap 15.6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.20.1
* kernel-source-azure-6.4.0-150600.8.20.1
* Public Cloud Module 15-SP6 (aarch64 x86_64)
* kernel-syms-azure-6.4.0-150600.8.20.1
* kernel-azure-devel-6.4.0-150600.8.20.1
* kernel-azure-debugsource-6.4.0-150600.8.20.1
* kernel-azure-debuginfo-6.4.0-150600.8.20.1
* kernel-azure-devel-debuginfo-6.4.0-150600.8.20.1
* Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.20.1
* Public Cloud Module 15-SP6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.20.1
* kernel-source-azure-6.4.0-150600.8.20.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52778.html
* https://www.suse.com/security/cve/CVE-2023-52920.html
* https://www.suse.com/security/cve/CVE-2023-52921.html
* https://www.suse.com/security/cve/CVE-2023-52922.html
* https://www.suse.com/security/cve/CVE-2024-26596.html
* https://www.suse.com/security/cve/CVE-2024-26703.html
* https://www.suse.com/security/cve/CVE-2024-26741.html
* https://www.suse.com/security/cve/CVE-2024-26782.html
* https://www.suse.com/security/cve/CVE-2024-26864.html
* https://www.suse.com/security/cve/CVE-2024-26953.html
* https://www.suse.com/security/cve/CVE-2024-27017.html
* https://www.suse.com/security/cve/CVE-2024-27407.html
* https://www.suse.com/security/cve/CVE-2024-35888.html
* https://www.suse.com/security/cve/CVE-2024-36000.html
* https://www.suse.com/security/cve/CVE-2024-36031.html
* https://www.suse.com/security/cve/CVE-2024-36484.html
* https://www.suse.com/security/cve/CVE-2024-36883.html
* https://www.suse.com/security/cve/CVE-2024-36886.html
* https://www.suse.com/security/cve/CVE-2024-36905.html
* https://www.suse.com/security/cve/CVE-2024-36920.html
* https://www.suse.com/security/cve/CVE-2024-36927.html
* https://www.suse.com/security/cve/CVE-2024-36954.html
* https://www.suse.com/security/cve/CVE-2024-36968.html
* https://www.suse.com/security/cve/CVE-2024-38589.html
* https://www.suse.com/security/cve/CVE-2024-40914.html
* https://www.suse.com/security/cve/CVE-2024-41023.html
* https://www.suse.com/security/cve/CVE-2024-42102.html
* https://www.suse.com/security/cve/CVE-2024-44995.html
* https://www.suse.com/security/cve/CVE-2024-46680.html
* https://www.suse.com/security/cve/CVE-2024-46681.html
* https://www.suse.com/security/cve/CVE-2024-46765.html
* https://www.suse.com/security/cve/CVE-2024-46788.html
* https://www.suse.com/security/cve/CVE-2024-46800.html
* https://www.suse.com/security/cve/CVE-2024-46828.html
* https://www.suse.com/security/cve/CVE-2024-46845.html
* https://www.suse.com/security/cve/CVE-2024-47666.html
* https://www.suse.com/security/cve/CVE-2024-47679.html
* https://www.suse.com/security/cve/CVE-2024-47701.html
* https://www.suse.com/security/cve/CVE-2024-47703.html
* https://www.suse.com/security/cve/CVE-2024-49868.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49888.html
* https://www.suse.com/security/cve/CVE-2024-49899.html
* https://www.suse.com/security/cve/CVE-2024-49905.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49911.html
* https://www.suse.com/security/cve/CVE-2024-49912.html
* https://www.suse.com/security/cve/CVE-2024-49921.html
* https://www.suse.com/security/cve/CVE-2024-49922.html
* https://www.suse.com/security/cve/CVE-2024-49923.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-49933.html
* https://www.suse.com/security/cve/CVE-2024-49934.html
* https://www.suse.com/security/cve/CVE-2024-49944.html
* https://www.suse.com/security/cve/CVE-2024-49945.html
* https://www.suse.com/security/cve/CVE-2024-49952.html
* https://www.suse.com/security/cve/CVE-2024-49968.html
* https://www.suse.com/security/cve/CVE-2024-49975.html
* https://www.suse.com/security/cve/CVE-2024-49976.html
* https://www.suse.com/security/cve/CVE-2024-49983.html
* https://www.suse.com/security/cve/CVE-2024-49987.html
* https://www.suse.com/security/cve/CVE-2024-49989.html
* https://www.suse.com/security/cve/CVE-2024-50003.html
* https://www.suse.com/security/cve/CVE-2024-50004.html
* https://www.suse.com/security/cve/CVE-2024-50006.html
* https://www.suse.com/security/cve/CVE-2024-50009.html
* https://www.suse.com/security/cve/CVE-2024-50012.html
* https://www.suse.com/security/cve/CVE-2024-50014.html
* https://www.suse.com/security/cve/CVE-2024-50026.html
* https://www.suse.com/security/cve/CVE-2024-50067.html
* https://www.suse.com/security/cve/CVE-2024-50082.html
* https://www.suse.com/security/cve/CVE-2024-50084.html
* https://www.suse.com/security/cve/CVE-2024-50087.html
* https://www.suse.com/security/cve/CVE-2024-50088.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50093.html
* https://www.suse.com/security/cve/CVE-2024-50095.html
* https://www.suse.com/security/cve/CVE-2024-50096.html
* https://www.suse.com/security/cve/CVE-2024-50098.html
* https://www.suse.com/security/cve/CVE-2024-50099.html
* https://www.suse.com/security/cve/CVE-2024-50100.html
* https://www.suse.com/security/cve/CVE-2024-50101.html
* https://www.suse.com/security/cve/CVE-2024-50102.html
* https://www.suse.com/security/cve/CVE-2024-50103.html
* https://www.suse.com/security/cve/CVE-2024-50108.html
* https://www.suse.com/security/cve/CVE-2024-50110.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50116.html
* https://www.suse.com/security/cve/CVE-2024-50117.html
* https://www.suse.com/security/cve/CVE-2024-50121.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50128.html
* https://www.suse.com/security/cve/CVE-2024-50130.html
* https://www.suse.com/security/cve/CVE-2024-50131.html
* https://www.suse.com/security/cve/CVE-2024-50134.html
* https://www.suse.com/security/cve/CVE-2024-50135.html
* https://www.suse.com/security/cve/CVE-2024-50136.html
* https://www.suse.com/security/cve/CVE-2024-50138.html
* https://www.suse.com/security/cve/CVE-2024-50139.html
* https://www.suse.com/security/cve/CVE-2024-50141.html
* https://www.suse.com/security/cve/CVE-2024-50145.html
* https://www.suse.com/security/cve/CVE-2024-50146.html
* https://www.suse.com/security/cve/CVE-2024-50147.html
* https://www.suse.com/security/cve/CVE-2024-50148.html
* https://www.suse.com/security/cve/CVE-2024-50150.html
* https://www.suse.com/security/cve/CVE-2024-50153.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50155.html
* https://www.suse.com/security/cve/CVE-2024-50156.html
* https://www.suse.com/security/cve/CVE-2024-50157.html
* https://www.suse.com/security/cve/CVE-2024-50158.html
* https://www.suse.com/security/cve/CVE-2024-50159.html
* https://www.suse.com/security/cve/CVE-2024-50160.html
* https://www.suse.com/security/cve/CVE-2024-50166.html
* https://www.suse.com/security/cve/CVE-2024-50167.html
* https://www.suse.com/security/cve/CVE-2024-50169.html
* https://www.suse.com/security/cve/CVE-2024-50171.html
* https://www.suse.com/security/cve/CVE-2024-50172.html
* https://www.suse.com/security/cve/CVE-2024-50175.html
* https://www.suse.com/security/cve/CVE-2024-50176.html
* https://www.suse.com/security/cve/CVE-2024-50177.html
* https://www.suse.com/security/cve/CVE-2024-50179.html
* https://www.suse.com/security/cve/CVE-2024-50180.html
* https://www.suse.com/security/cve/CVE-2024-50181.html
* https://www.suse.com/security/cve/CVE-2024-50182.html
* https://www.suse.com/security/cve/CVE-2024-50183.html
* https://www.suse.com/security/cve/CVE-2024-50184.html
* https://www.suse.com/security/cve/CVE-2024-50186.html
* https://www.suse.com/security/cve/CVE-2024-50187.html
* https://www.suse.com/security/cve/CVE-2024-50188.html
* https://www.suse.com/security/cve/CVE-2024-50189.html
* https://www.suse.com/security/cve/CVE-2024-50192.html
* https://www.suse.com/security/cve/CVE-2024-50194.html
* https://www.suse.com/security/cve/CVE-2024-50195.html
* https://www.suse.com/security/cve/CVE-2024-50196.html
* https://www.suse.com/security/cve/CVE-2024-50198.html
* https://www.suse.com/security/cve/CVE-2024-50200.html
* https://www.suse.com/security/cve/CVE-2024-50201.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50209.html
* https://www.suse.com/security/cve/CVE-2024-50210.html
* https://www.suse.com/security/cve/CVE-2024-50215.html
* https://www.suse.com/security/cve/CVE-2024-50216.html
* https://www.suse.com/security/cve/CVE-2024-50218.html
* https://www.suse.com/security/cve/CVE-2024-50221.html
* https://www.suse.com/security/cve/CVE-2024-50224.html
* https://www.suse.com/security/cve/CVE-2024-50225.html
* https://www.suse.com/security/cve/CVE-2024-50228.html
* https://www.suse.com/security/cve/CVE-2024-50229.html
* https://www.suse.com/security/cve/CVE-2024-50230.html
* https://www.suse.com/security/cve/CVE-2024-50231.html
* https://www.suse.com/security/cve/CVE-2024-50232.html
* https://www.suse.com/security/cve/CVE-2024-50233.html
* https://www.suse.com/security/cve/CVE-2024-50234.html
* https://www.suse.com/security/cve/CVE-2024-50235.html
* https://www.suse.com/security/cve/CVE-2024-50236.html
* https://www.suse.com/security/cve/CVE-2024-50237.html
* https://www.suse.com/security/cve/CVE-2024-50240.html
* https://www.suse.com/security/cve/CVE-2024-50245.html
* https://www.suse.com/security/cve/CVE-2024-50246.html
* https://www.suse.com/security/cve/CVE-2024-50248.html
* https://www.suse.com/security/cve/CVE-2024-50249.html
* https://www.suse.com/security/cve/CVE-2024-50250.html
* https://www.suse.com/security/cve/CVE-2024-50252.html
* https://www.suse.com/security/cve/CVE-2024-50255.html
* https://www.suse.com/security/cve/CVE-2024-50257.html
* https://www.suse.com/security/cve/CVE-2024-50261.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50265.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50268.html
* https://www.suse.com/security/cve/CVE-2024-50269.html
* https://www.suse.com/security/cve/CVE-2024-50271.html
* https://www.suse.com/security/cve/CVE-2024-50273.html
* https://www.suse.com/security/cve/CVE-2024-50274.html
* https://www.suse.com/security/cve/CVE-2024-50275.html
* https://www.suse.com/security/cve/CVE-2024-50276.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50282.html
* https://www.suse.com/security/cve/CVE-2024-50287.html
* https://www.suse.com/security/cve/CVE-2024-50289.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50292.html
* https://www.suse.com/security/cve/CVE-2024-50295.html
* https://www.suse.com/security/cve/CVE-2024-50296.html
* https://www.suse.com/security/cve/CVE-2024-50298.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53042.html
* https://www.suse.com/security/cve/CVE-2024-53043.html
* https://www.suse.com/security/cve/CVE-2024-53045.html
* https://www.suse.com/security/cve/CVE-2024-53048.html
* https://www.suse.com/security/cve/CVE-2024-53051.html
* https://www.suse.com/security/cve/CVE-2024-53052.html
* https://www.suse.com/security/cve/CVE-2024-53055.html
* https://www.suse.com/security/cve/CVE-2024-53056.html
* https://www.suse.com/security/cve/CVE-2024-53058.html
* https://www.suse.com/security/cve/CVE-2024-53059.html
* https://www.suse.com/security/cve/CVE-2024-53060.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53066.html
* https://www.suse.com/security/cve/CVE-2024-53068.html
* https://www.suse.com/security/cve/CVE-2024-53072.html
* https://www.suse.com/security/cve/CVE-2024-53074.html
* https://www.suse.com/security/cve/CVE-2024-53076.html
* https://www.suse.com/security/cve/CVE-2024-53079.html
* https://www.suse.com/security/cve/CVE-2024-53081.html
* https://www.suse.com/security/cve/CVE-2024-53082.html
* https://www.suse.com/security/cve/CVE-2024-53085.html
* https://www.suse.com/security/cve/CVE-2024-53088.html
* https://www.suse.com/security/cve/CVE-2024-53093.html
* https://www.suse.com/security/cve/CVE-2024-53094.html
* https://www.suse.com/security/cve/CVE-2024-53095.html
* https://www.suse.com/security/cve/CVE-2024-53096.html
* https://www.suse.com/security/cve/CVE-2024-53100.html
* https://www.suse.com/security/cve/CVE-2024-53101.html
* https://www.suse.com/security/cve/CVE-2024-53104.html
* https://www.suse.com/security/cve/CVE-2024-53106.html
* https://www.suse.com/security/cve/CVE-2024-53108.html
* https://www.suse.com/security/cve/CVE-2024-53110.html
* https://www.suse.com/security/cve/CVE-2024-53112.html
* https://www.suse.com/security/cve/CVE-2024-53114.html
* https://www.suse.com/security/cve/CVE-2024-53121.html
* https://www.suse.com/security/cve/CVE-2024-53138.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1082555
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1220355
* https://bugzilla.suse.com/show_bug.cgi?id=1221309
* https://bugzilla.suse.com/show_bug.cgi?id=1222423
* https://bugzilla.suse.com/show_bug.cgi?id=1222587
* https://bugzilla.suse.com/show_bug.cgi?id=1222590
* https://bugzilla.suse.com/show_bug.cgi?id=1223112
* https://bugzilla.suse.com/show_bug.cgi?id=1223656
* https://bugzilla.suse.com/show_bug.cgi?id=1223733
* https://bugzilla.suse.com/show_bug.cgi?id=1224429
* https://bugzilla.suse.com/show_bug.cgi?id=1224518
* https://bugzilla.suse.com/show_bug.cgi?id=1224548
* https://bugzilla.suse.com/show_bug.cgi?id=1224948
* https://bugzilla.suse.com/show_bug.cgi?id=1225713
* https://bugzilla.suse.com/show_bug.cgi?id=1225725
* https://bugzilla.suse.com/show_bug.cgi?id=1225730
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1225764
* https://bugzilla.suse.com/show_bug.cgi?id=1225768
* https://bugzilla.suse.com/show_bug.cgi?id=1225813
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226130
* https://bugzilla.suse.com/show_bug.cgi?id=1226748
* https://bugzilla.suse.com/show_bug.cgi?id=1226872
* https://bugzilla.suse.com/show_bug.cgi?id=1227726
* https://bugzilla.suse.com/show_bug.cgi?id=1227842
* https://bugzilla.suse.com/show_bug.cgi?id=1228430
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1229165
* https://bugzilla.suse.com/show_bug.cgi?id=1230231
* https://bugzilla.suse.com/show_bug.cgi?id=1230557
* https://bugzilla.suse.com/show_bug.cgi?id=1230558
* https://bugzilla.suse.com/show_bug.cgi?id=1230733
* https://bugzilla.suse.com/show_bug.cgi?id=1230807
* https://bugzilla.suse.com/show_bug.cgi?id=1230817
* https://bugzilla.suse.com/show_bug.cgi?id=1230827
* https://bugzilla.suse.com/show_bug.cgi?id=1230971
* https://bugzilla.suse.com/show_bug.cgi?id=1231076
* https://bugzilla.suse.com/show_bug.cgi?id=1231114
* https://bugzilla.suse.com/show_bug.cgi?id=1231182
* https://bugzilla.suse.com/show_bug.cgi?id=1231453
* https://bugzilla.suse.com/show_bug.cgi?id=1231465
* https://bugzilla.suse.com/show_bug.cgi?id=1231630
* https://bugzilla.suse.com/show_bug.cgi?id=1231920
* https://bugzilla.suse.com/show_bug.cgi?id=1231930
* https://bugzilla.suse.com/show_bug.cgi?id=1231946
* https://bugzilla.suse.com/show_bug.cgi?id=1231952
* https://bugzilla.suse.com/show_bug.cgi?id=1232096
* https://bugzilla.suse.com/show_bug.cgi?id=1232103
* https://bugzilla.suse.com/show_bug.cgi?id=1232104
* https://bugzilla.suse.com/show_bug.cgi?id=1232157
* https://bugzilla.suse.com/show_bug.cgi?id=1232165
* https://bugzilla.suse.com/show_bug.cgi?id=1232166
* https://bugzilla.suse.com/show_bug.cgi?id=1232198
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232207
* https://bugzilla.suse.com/show_bug.cgi?id=1232208
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1232258
* https://bugzilla.suse.com/show_bug.cgi?id=1232264
* https://bugzilla.suse.com/show_bug.cgi?id=1232272
* https://bugzilla.suse.com/show_bug.cgi?id=1232318
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232357
* https://bugzilla.suse.com/show_bug.cgi?id=1232358
* https://bugzilla.suse.com/show_bug.cgi?id=1232361
* https://bugzilla.suse.com/show_bug.cgi?id=1232366
* https://bugzilla.suse.com/show_bug.cgi?id=1232367
* https://bugzilla.suse.com/show_bug.cgi?id=1232368
* https://bugzilla.suse.com/show_bug.cgi?id=1232371
* https://bugzilla.suse.com/show_bug.cgi?id=1232374
* https://bugzilla.suse.com/show_bug.cgi?id=1232385
* https://bugzilla.suse.com/show_bug.cgi?id=1232386
* https://bugzilla.suse.com/show_bug.cgi?id=1232387
* https://bugzilla.suse.com/show_bug.cgi?id=1232396
* https://bugzilla.suse.com/show_bug.cgi?id=1232413
* https://bugzilla.suse.com/show_bug.cgi?id=1232416
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232442
* https://bugzilla.suse.com/show_bug.cgi?id=1232446
* https://bugzilla.suse.com/show_bug.cgi?id=1232483
* https://bugzilla.suse.com/show_bug.cgi?id=1232494
* https://bugzilla.suse.com/show_bug.cgi?id=1232498
* https://bugzilla.suse.com/show_bug.cgi?id=1232499
* https://bugzilla.suse.com/show_bug.cgi?id=1232500
* https://bugzilla.suse.com/show_bug.cgi?id=1232704
* https://bugzilla.suse.com/show_bug.cgi?id=1232757
* https://bugzilla.suse.com/show_bug.cgi?id=1232823
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232869
* https://bugzilla.suse.com/show_bug.cgi?id=1232870
* https://bugzilla.suse.com/show_bug.cgi?id=1232873
* https://bugzilla.suse.com/show_bug.cgi?id=1232876
* https://bugzilla.suse.com/show_bug.cgi?id=1232877
* https://bugzilla.suse.com/show_bug.cgi?id=1232878
* https://bugzilla.suse.com/show_bug.cgi?id=1232880
* https://bugzilla.suse.com/show_bug.cgi?id=1232881
* https://bugzilla.suse.com/show_bug.cgi?id=1232884
* https://bugzilla.suse.com/show_bug.cgi?id=1232885
* https://bugzilla.suse.com/show_bug.cgi?id=1232887
* https://bugzilla.suse.com/show_bug.cgi?id=1232888
* https://bugzilla.suse.com/show_bug.cgi?id=1232890
* https://bugzilla.suse.com/show_bug.cgi?id=1232892
* https://bugzilla.suse.com/show_bug.cgi?id=1232894
* https://bugzilla.suse.com/show_bug.cgi?id=1232896
* https://bugzilla.suse.com/show_bug.cgi?id=1232897
* https://bugzilla.suse.com/show_bug.cgi?id=1232905
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232914
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232925
* https://bugzilla.suse.com/show_bug.cgi?id=1232926
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1232935
* https://bugzilla.suse.com/show_bug.cgi?id=1233029
* https://bugzilla.suse.com/show_bug.cgi?id=1233032
* https://bugzilla.suse.com/show_bug.cgi?id=1233035
* https://bugzilla.suse.com/show_bug.cgi?id=1233036
* https://bugzilla.suse.com/show_bug.cgi?id=1233041
* https://bugzilla.suse.com/show_bug.cgi?id=1233044
* https://bugzilla.suse.com/show_bug.cgi?id=1233049
* https://bugzilla.suse.com/show_bug.cgi?id=1233050
* https://bugzilla.suse.com/show_bug.cgi?id=1233051
* https://bugzilla.suse.com/show_bug.cgi?id=1233056
* https://bugzilla.suse.com/show_bug.cgi?id=1233057
* https://bugzilla.suse.com/show_bug.cgi?id=1233061
* https://bugzilla.suse.com/show_bug.cgi?id=1233062
* https://bugzilla.suse.com/show_bug.cgi?id=1233063
* https://bugzilla.suse.com/show_bug.cgi?id=1233065
* https://bugzilla.suse.com/show_bug.cgi?id=1233067
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233073
* https://bugzilla.suse.com/show_bug.cgi?id=1233074
* https://bugzilla.suse.com/show_bug.cgi?id=1233088
* https://bugzilla.suse.com/show_bug.cgi?id=1233091
* https://bugzilla.suse.com/show_bug.cgi?id=1233092
* https://bugzilla.suse.com/show_bug.cgi?id=1233097
* https://bugzilla.suse.com/show_bug.cgi?id=1233100
* https://bugzilla.suse.com/show_bug.cgi?id=1233103
* https://bugzilla.suse.com/show_bug.cgi?id=1233104
* https://bugzilla.suse.com/show_bug.cgi?id=1233105
* https://bugzilla.suse.com/show_bug.cgi?id=1233106
* https://bugzilla.suse.com/show_bug.cgi?id=1233107
* https://bugzilla.suse.com/show_bug.cgi?id=1233108
* https://bugzilla.suse.com/show_bug.cgi?id=1233110
* https://bugzilla.suse.com/show_bug.cgi?id=1233111
* https://bugzilla.suse.com/show_bug.cgi?id=1233113
* https://bugzilla.suse.com/show_bug.cgi?id=1233114
* https://bugzilla.suse.com/show_bug.cgi?id=1233115
* https://bugzilla.suse.com/show_bug.cgi?id=1233117
* https://bugzilla.suse.com/show_bug.cgi?id=1233119
* https://bugzilla.suse.com/show_bug.cgi?id=1233123
* https://bugzilla.suse.com/show_bug.cgi?id=1233125
* https://bugzilla.suse.com/show_bug.cgi?id=1233127
* https://bugzilla.suse.com/show_bug.cgi?id=1233129
* https://bugzilla.suse.com/show_bug.cgi?id=1233130
* https://bugzilla.suse.com/show_bug.cgi?id=1233132
* https://bugzilla.suse.com/show_bug.cgi?id=1233135
* https://bugzilla.suse.com/show_bug.cgi?id=1233176
* https://bugzilla.suse.com/show_bug.cgi?id=1233179
* https://bugzilla.suse.com/show_bug.cgi?id=1233185
* https://bugzilla.suse.com/show_bug.cgi?id=1233188
* https://bugzilla.suse.com/show_bug.cgi?id=1233189
* https://bugzilla.suse.com/show_bug.cgi?id=1233191
* https://bugzilla.suse.com/show_bug.cgi?id=1233193
* https://bugzilla.suse.com/show_bug.cgi?id=1233197
* https://bugzilla.suse.com/show_bug.cgi?id=1233201
* https://bugzilla.suse.com/show_bug.cgi?id=1233203
* https://bugzilla.suse.com/show_bug.cgi?id=1233204
* https://bugzilla.suse.com/show_bug.cgi?id=1233205
* https://bugzilla.suse.com/show_bug.cgi?id=1233206
* https://bugzilla.suse.com/show_bug.cgi?id=1233207
* https://bugzilla.suse.com/show_bug.cgi?id=1233208
* https://bugzilla.suse.com/show_bug.cgi?id=1233209
* https://bugzilla.suse.com/show_bug.cgi?id=1233210
* https://bugzilla.suse.com/show_bug.cgi?id=1233211
* https://bugzilla.suse.com/show_bug.cgi?id=1233212
* https://bugzilla.suse.com/show_bug.cgi?id=1233216
* https://bugzilla.suse.com/show_bug.cgi?id=1233217
* https://bugzilla.suse.com/show_bug.cgi?id=1233219
* https://bugzilla.suse.com/show_bug.cgi?id=1233226
* https://bugzilla.suse.com/show_bug.cgi?id=1233238
* https://bugzilla.suse.com/show_bug.cgi?id=1233241
* https://bugzilla.suse.com/show_bug.cgi?id=1233244
* https://bugzilla.suse.com/show_bug.cgi?id=1233253
* https://bugzilla.suse.com/show_bug.cgi?id=1233255
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233298
* https://bugzilla.suse.com/show_bug.cgi?id=1233305
* https://bugzilla.suse.com/show_bug.cgi?id=1233320
* https://bugzilla.suse.com/show_bug.cgi?id=1233350
* https://bugzilla.suse.com/show_bug.cgi?id=1233443
* https://bugzilla.suse.com/show_bug.cgi?id=1233452
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233454
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233457
* https://bugzilla.suse.com/show_bug.cgi?id=1233458
* https://bugzilla.suse.com/show_bug.cgi?id=1233460
* https://bugzilla.suse.com/show_bug.cgi?id=1233462
* https://bugzilla.suse.com/show_bug.cgi?id=1233463
* https://bugzilla.suse.com/show_bug.cgi?id=1233464
* https://bugzilla.suse.com/show_bug.cgi?id=1233465
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233471
* https://bugzilla.suse.com/show_bug.cgi?id=1233476
* https://bugzilla.suse.com/show_bug.cgi?id=1233478
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233481
* https://bugzilla.suse.com/show_bug.cgi?id=1233484
* https://bugzilla.suse.com/show_bug.cgi?id=1233485
* https://bugzilla.suse.com/show_bug.cgi?id=1233487
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233523
* https://bugzilla.suse.com/show_bug.cgi?id=1233524
* https://bugzilla.suse.com/show_bug.cgi?id=1233540
* https://bugzilla.suse.com/show_bug.cgi?id=1233547
* https://bugzilla.suse.com/show_bug.cgi?id=1233548
* https://bugzilla.suse.com/show_bug.cgi?id=1233550
* https://bugzilla.suse.com/show_bug.cgi?id=1233552
* https://bugzilla.suse.com/show_bug.cgi?id=1233553
* https://bugzilla.suse.com/show_bug.cgi?id=1233554
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233560
* https://bugzilla.suse.com/show_bug.cgi?id=1233561
* https://bugzilla.suse.com/show_bug.cgi?id=1233564
* https://bugzilla.suse.com/show_bug.cgi?id=1233566
* https://bugzilla.suse.com/show_bug.cgi?id=1233567
* https://bugzilla.suse.com/show_bug.cgi?id=1233568
* https://bugzilla.suse.com/show_bug.cgi?id=1233570
* https://bugzilla.suse.com/show_bug.cgi?id=1233572
* https://bugzilla.suse.com/show_bug.cgi?id=1233573
* https://bugzilla.suse.com/show_bug.cgi?id=1233577
* https://bugzilla.suse.com/show_bug.cgi?id=1233580
* https://bugzilla.suse.com/show_bug.cgi?id=1233640
* https://bugzilla.suse.com/show_bug.cgi?id=1233641
* https://bugzilla.suse.com/show_bug.cgi?id=1233642
* https://bugzilla.suse.com/show_bug.cgi?id=1233721
* https://bugzilla.suse.com/show_bug.cgi?id=1233754
* https://bugzilla.suse.com/show_bug.cgi?id=1233756
* https://bugzilla.suse.com/show_bug.cgi?id=1233769
* https://bugzilla.suse.com/show_bug.cgi?id=1233771
* https://bugzilla.suse.com/show_bug.cgi?id=1233977
* https://bugzilla.suse.com/show_bug.cgi?id=1234009
* https://bugzilla.suse.com/show_bug.cgi?id=1234011
* https://bugzilla.suse.com/show_bug.cgi?id=1234012
* https://bugzilla.suse.com/show_bug.cgi?id=1234025
* https://bugzilla.suse.com/show_bug.cgi?id=1234039
* https://bugzilla.suse.com/show_bug.cgi?id=1234040
* https://bugzilla.suse.com/show_bug.cgi?id=1234041
* https://bugzilla.suse.com/show_bug.cgi?id=1234042
* https://bugzilla.suse.com/show_bug.cgi?id=1234043
* https://bugzilla.suse.com/show_bug.cgi?id=1234044
* https://bugzilla.suse.com/show_bug.cgi?id=1234045
* https://bugzilla.suse.com/show_bug.cgi?id=1234046
* https://bugzilla.suse.com/show_bug.cgi?id=1234072
* https://bugzilla.suse.com/show_bug.cgi?id=1234078
* https://bugzilla.suse.com/show_bug.cgi?id=1234081
* https://bugzilla.suse.com/show_bug.cgi?id=1234083
* https://bugzilla.suse.com/show_bug.cgi?id=1234085
* https://bugzilla.suse.com/show_bug.cgi?id=1234087
* https://bugzilla.suse.com/show_bug.cgi?id=1234093
* https://bugzilla.suse.com/show_bug.cgi?id=1234098
* https://bugzilla.suse.com/show_bug.cgi?id=1234108
* https://bugzilla.suse.com/show_bug.cgi?id=1234121
* https://bugzilla.suse.com/show_bug.cgi?id=1234223
* https://jira.suse.com/browse/PED-11316
* https://jira.suse.com/browse/PED-11442
* https://jira.suse.com/browse/PED-11580
* https://jira.suse.com/browse/PED-9943
1
0
13 Dec '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:4314-1
Release Date: 2024-12-13T15:23:19Z
Rating: important
References:
* bsc#1012628
* bsc#1082555
* bsc#1194869
* bsc#1215199
* bsc#1218644
* bsc#1220355
* bsc#1221309
* bsc#1222423
* bsc#1222587
* bsc#1222590
* bsc#1223112
* bsc#1223656
* bsc#1223733
* bsc#1224429
* bsc#1224518
* bsc#1224548
* bsc#1224948
* bsc#1225713
* bsc#1225725
* bsc#1225730
* bsc#1225742
* bsc#1225764
* bsc#1225768
* bsc#1225813
* bsc#1225903
* bsc#1226130
* bsc#1226748
* bsc#1226872
* bsc#1227726
* bsc#1227842
* bsc#1228430
* bsc#1228850
* bsc#1229165
* bsc#1230231
* bsc#1230557
* bsc#1230558
* bsc#1230733
* bsc#1230807
* bsc#1230817
* bsc#1230827
* bsc#1230971
* bsc#1231076
* bsc#1231114
* bsc#1231182
* bsc#1231453
* bsc#1231465
* bsc#1231630
* bsc#1231920
* bsc#1231930
* bsc#1231946
* bsc#1231952
* bsc#1232079
* bsc#1232096
* bsc#1232103
* bsc#1232104
* bsc#1232149
* bsc#1232157
* bsc#1232165
* bsc#1232166
* bsc#1232198
* bsc#1232199
* bsc#1232201
* bsc#1232207
* bsc#1232224
* bsc#1232258
* bsc#1232259
* bsc#1232264
* bsc#1232272
* bsc#1232305
* bsc#1232307
* bsc#1232318
* bsc#1232335
* bsc#1232337
* bsc#1232352
* bsc#1232354
* bsc#1232355
* bsc#1232357
* bsc#1232358
* bsc#1232361
* bsc#1232366
* bsc#1232367
* bsc#1232368
* bsc#1232371
* bsc#1232374
* bsc#1232385
* bsc#1232386
* bsc#1232387
* bsc#1232396
* bsc#1232413
* bsc#1232416
* bsc#1232436
* bsc#1232442
* bsc#1232446
* bsc#1232483
* bsc#1232494
* bsc#1232498
* bsc#1232499
* bsc#1232500
* bsc#1232501
* bsc#1232502
* bsc#1232704
* bsc#1232757
* bsc#1232819
* bsc#1232823
* bsc#1232860
* bsc#1232869
* bsc#1232870
* bsc#1232873
* bsc#1232876
* bsc#1232877
* bsc#1232878
* bsc#1232880
* bsc#1232881
* bsc#1232884
* bsc#1232885
* bsc#1232887
* bsc#1232888
* bsc#1232890
* bsc#1232892
* bsc#1232894
* bsc#1232896
* bsc#1232897
* bsc#1232905
* bsc#1232907
* bsc#1232914
* bsc#1232919
* bsc#1232925
* bsc#1232926
* bsc#1232928
* bsc#1232935
* bsc#1233029
* bsc#1233032
* bsc#1233035
* bsc#1233036
* bsc#1233041
* bsc#1233044
* bsc#1233049
* bsc#1233050
* bsc#1233051
* bsc#1233056
* bsc#1233057
* bsc#1233061
* bsc#1233062
* bsc#1233063
* bsc#1233065
* bsc#1233067
* bsc#1233070
* bsc#1233073
* bsc#1233074
* bsc#1233088
* bsc#1233091
* bsc#1233092
* bsc#1233097
* bsc#1233100
* bsc#1233103
* bsc#1233104
* bsc#1233105
* bsc#1233106
* bsc#1233107
* bsc#1233108
* bsc#1233110
* bsc#1233111
* bsc#1233113
* bsc#1233114
* bsc#1233115
* bsc#1233117
* bsc#1233119
* bsc#1233123
* bsc#1233125
* bsc#1233127
* bsc#1233129
* bsc#1233130
* bsc#1233132
* bsc#1233135
* bsc#1233176
* bsc#1233179
* bsc#1233185
* bsc#1233188
* bsc#1233189
* bsc#1233191
* bsc#1233193
* bsc#1233197
* bsc#1233201
* bsc#1233203
* bsc#1233204
* bsc#1233205
* bsc#1233206
* bsc#1233207
* bsc#1233208
* bsc#1233209
* bsc#1233210
* bsc#1233211
* bsc#1233212
* bsc#1233216
* bsc#1233217
* bsc#1233219
* bsc#1233226
* bsc#1233238
* bsc#1233241
* bsc#1233244
* bsc#1233253
* bsc#1233255
* bsc#1233293
* bsc#1233298
* bsc#1233305
* bsc#1233320
* bsc#1233350
* bsc#1233443
* bsc#1233452
* bsc#1233453
* bsc#1233454
* bsc#1233456
* bsc#1233457
* bsc#1233458
* bsc#1233460
* bsc#1233462
* bsc#1233463
* bsc#1233464
* bsc#1233465
* bsc#1233468
* bsc#1233471
* bsc#1233476
* bsc#1233478
* bsc#1233479
* bsc#1233481
* bsc#1233484
* bsc#1233485
* bsc#1233487
* bsc#1233490
* bsc#1233491
* bsc#1233523
* bsc#1233524
* bsc#1233540
* bsc#1233547
* bsc#1233548
* bsc#1233550
* bsc#1233552
* bsc#1233553
* bsc#1233554
* bsc#1233555
* bsc#1233557
* bsc#1233560
* bsc#1233561
* bsc#1233564
* bsc#1233566
* bsc#1233567
* bsc#1233568
* bsc#1233570
* bsc#1233572
* bsc#1233573
* bsc#1233577
* bsc#1233580
* bsc#1233640
* bsc#1233641
* bsc#1233642
* bsc#1233721
* bsc#1233754
* bsc#1233756
* bsc#1233769
* bsc#1233771
* bsc#1233977
* bsc#1234009
* bsc#1234011
* bsc#1234012
* bsc#1234025
* bsc#1234039
* bsc#1234040
* bsc#1234041
* bsc#1234042
* bsc#1234043
* bsc#1234044
* bsc#1234045
* bsc#1234046
* bsc#1234072
* bsc#1234078
* bsc#1234081
* bsc#1234083
* bsc#1234085
* bsc#1234087
* bsc#1234093
* bsc#1234098
* bsc#1234108
* bsc#1234121
* bsc#1234223
* jsc#PED-11316
* jsc#PED-11442
* jsc#PED-11580
* jsc#PED-9943
Cross-References:
* CVE-2023-52778
* CVE-2023-52920
* CVE-2023-52921
* CVE-2023-52922
* CVE-2024-26596
* CVE-2024-26703
* CVE-2024-26741
* CVE-2024-26782
* CVE-2024-26864
* CVE-2024-26953
* CVE-2024-27017
* CVE-2024-27407
* CVE-2024-35888
* CVE-2024-36000
* CVE-2024-36031
* CVE-2024-36484
* CVE-2024-36883
* CVE-2024-36886
* CVE-2024-36905
* CVE-2024-36920
* CVE-2024-36927
* CVE-2024-36954
* CVE-2024-36968
* CVE-2024-38589
* CVE-2024-40914
* CVE-2024-41023
* CVE-2024-42102
* CVE-2024-44995
* CVE-2024-46680
* CVE-2024-46681
* CVE-2024-46765
* CVE-2024-46788
* CVE-2024-46800
* CVE-2024-46828
* CVE-2024-46845
* CVE-2024-47666
* CVE-2024-47679
* CVE-2024-47701
* CVE-2024-47703
* CVE-2024-49852
* CVE-2024-49866
* CVE-2024-49868
* CVE-2024-49881
* CVE-2024-49883
* CVE-2024-49884
* CVE-2024-49894
* CVE-2024-49895
* CVE-2024-49897
* CVE-2024-49899
* CVE-2024-49901
* CVE-2024-49905
* CVE-2024-49908
* CVE-2024-49909
* CVE-2024-49911
* CVE-2024-49912
* CVE-2024-49913
* CVE-2024-49921
* CVE-2024-49922
* CVE-2024-49923
* CVE-2024-49925
* CVE-2024-49933
* CVE-2024-49934
* CVE-2024-49944
* CVE-2024-49945
* CVE-2024-49952
* CVE-2024-49959
* CVE-2024-49968
* CVE-2024-49975
* CVE-2024-49976
* CVE-2024-49983
* CVE-2024-49987
* CVE-2024-49989
* CVE-2024-50003
* CVE-2024-50004
* CVE-2024-50006
* CVE-2024-50009
* CVE-2024-50012
* CVE-2024-50014
* CVE-2024-50015
* CVE-2024-50026
* CVE-2024-50067
* CVE-2024-50080
* CVE-2024-50081
* CVE-2024-50082
* CVE-2024-50084
* CVE-2024-50087
* CVE-2024-50088
* CVE-2024-50089
* CVE-2024-50093
* CVE-2024-50095
* CVE-2024-50096
* CVE-2024-50098
* CVE-2024-50099
* CVE-2024-50100
* CVE-2024-50101
* CVE-2024-50102
* CVE-2024-50103
* CVE-2024-50108
* CVE-2024-50110
* CVE-2024-50115
* CVE-2024-50116
* CVE-2024-50117
* CVE-2024-50121
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50128
* CVE-2024-50130
* CVE-2024-50131
* CVE-2024-50134
* CVE-2024-50135
* CVE-2024-50136
* CVE-2024-50138
* CVE-2024-50139
* CVE-2024-50141
* CVE-2024-50145
* CVE-2024-50146
* CVE-2024-50147
* CVE-2024-50148
* CVE-2024-50150
* CVE-2024-50153
* CVE-2024-50154
* CVE-2024-50155
* CVE-2024-50156
* CVE-2024-50157
* CVE-2024-50158
* CVE-2024-50159
* CVE-2024-50160
* CVE-2024-50166
* CVE-2024-50167
* CVE-2024-50169
* CVE-2024-50171
* CVE-2024-50172
* CVE-2024-50175
* CVE-2024-50176
* CVE-2024-50177
* CVE-2024-50179
* CVE-2024-50180
* CVE-2024-50181
* CVE-2024-50182
* CVE-2024-50183
* CVE-2024-50184
* CVE-2024-50186
* CVE-2024-50187
* CVE-2024-50188
* CVE-2024-50189
* CVE-2024-50192
* CVE-2024-50194
* CVE-2024-50195
* CVE-2024-50196
* CVE-2024-50198
* CVE-2024-50200
* CVE-2024-50201
* CVE-2024-50205
* CVE-2024-50208
* CVE-2024-50209
* CVE-2024-50210
* CVE-2024-50215
* CVE-2024-50216
* CVE-2024-50218
* CVE-2024-50221
* CVE-2024-50224
* CVE-2024-50225
* CVE-2024-50228
* CVE-2024-50229
* CVE-2024-50230
* CVE-2024-50231
* CVE-2024-50232
* CVE-2024-50233
* CVE-2024-50234
* CVE-2024-50235
* CVE-2024-50236
* CVE-2024-50237
* CVE-2024-50240
* CVE-2024-50245
* CVE-2024-50246
* CVE-2024-50248
* CVE-2024-50249
* CVE-2024-50250
* CVE-2024-50252
* CVE-2024-50255
* CVE-2024-50257
* CVE-2024-50261
* CVE-2024-50264
* CVE-2024-50265
* CVE-2024-50267
* CVE-2024-50268
* CVE-2024-50269
* CVE-2024-50271
* CVE-2024-50273
* CVE-2024-50274
* CVE-2024-50275
* CVE-2024-50276
* CVE-2024-50279
* CVE-2024-50282
* CVE-2024-50287
* CVE-2024-50289
* CVE-2024-50290
* CVE-2024-50292
* CVE-2024-50295
* CVE-2024-50296
* CVE-2024-50298
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53042
* CVE-2024-53043
* CVE-2024-53045
* CVE-2024-53048
* CVE-2024-53051
* CVE-2024-53052
* CVE-2024-53055
* CVE-2024-53056
* CVE-2024-53058
* CVE-2024-53059
* CVE-2024-53060
* CVE-2024-53061
* CVE-2024-53063
* CVE-2024-53066
* CVE-2024-53068
* CVE-2024-53072
* CVE-2024-53074
* CVE-2024-53076
* CVE-2024-53079
* CVE-2024-53081
* CVE-2024-53082
* CVE-2024-53085
* CVE-2024-53088
* CVE-2024-53093
* CVE-2024-53094
* CVE-2024-53095
* CVE-2024-53096
* CVE-2024-53100
* CVE-2024-53101
* CVE-2024-53104
* CVE-2024-53106
* CVE-2024-53108
* CVE-2024-53110
* CVE-2024-53112
* CVE-2024-53114
* CVE-2024-53121
* CVE-2024-53138
CVSS scores:
* CVE-2023-52778 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-52920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26596 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-26596 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26864 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-27407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36920 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-36927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41023 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-42102 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42102 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-42102 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46680 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
* CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46788 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47666 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47703 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47703 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49866 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49866 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49866 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49883 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49894 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49894 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49894 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49895 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49895 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-49895 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49897 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49901 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49909 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49913 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49933 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49933 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49959 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49968 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49987 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49987 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49989 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50003 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50004 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50006 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50088 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50121 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50121 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50128 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50130 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50134 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50135 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50136 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50139 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50139 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50145 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50148 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50150 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50153 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50158 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50159 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50160 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50169 ( SUSE ): 0.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50169 ( SUSE ): 0.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50171 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50177 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50180 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50181 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50183 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50208 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50210 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50221 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50228 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50229 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50231 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50231 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50232 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50233 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50236 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50245 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50246 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50248 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50248 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50248 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50250 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50250 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50250 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-50252 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50257 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50276 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50296 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53042 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53043 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53081 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53100 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53100 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53101 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53108 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53110 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Real Time Module 15-SP6
An update that solves 241 vulnerabilities, contains four features and has 43
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2023-52778: mptcp: deal with large GSO size (bsc#1224948).
* CVE-2023-52920: bpf: support non-r10 register spill/fill to/from stack in
precision tracking (bsc#1232823).
* CVE-2024-26596: net: dsa: fix netdev_priv() dereference before check on non-
DSA netdevice events (bsc#1220355).
* CVE-2024-26741: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after
check_estalblished() (bsc#1222587).
* CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
* CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
(bsc#1223656).
* CVE-2024-27017: netfilter: nft_set_pipapo: walk over current view on netlink
dump (bsc#1223733).
* CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head
(bsc#1224518).
* CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge
(bsc#1224548).
* CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
* CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
* CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
(bsc#1225742).
* CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb()
(bsc#1225813).
* CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
(bsc#1225764).
* CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()
(bsc#1226130).
* CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).
* CVE-2024-40914: mm/huge_memory: do not unpoison huge_zero_folio
(bsc#1227842).
* CVE-2024-41023: sched/deadline: Fix task_struct reference leak
(bsc#1228430).
* CVE-2024-42102: Revert "mm/writeback: fix possible divide-by-zero in
wb_dirty_limits(), again" (bsc#1233132).
* CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
resetting (bsc#1230231).
* CVE-2024-46680: Bluetooth: btnxpuart: Fix random crash seen while removing
driver (bsc#1230557).
* CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
* CVE-2024-46765: ice: protect XDP configuration with a mutex (bsc#1230807).
* CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).
* CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput()
(bsc#1231930).
* CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath
the filesystem (bsc#1231920).
* CVE-2024-47703: bpf, lsm: add check for BPF LSM return value (bsc#1231946).
* CVE-2024-49852: scsi: elx: libefc: Fix potential use after free in
efc_nport_vport_del() (bsc#1232819).
* CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a
new trasacntion (bsc#1232272).
* CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
* CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent()
(bsc#1232199).
* CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware
format translation (bsc#1232354).
* CVE-2024-49895: drm/amd/display: Fix index out of bounds in DCN30 degamma
hardware format translation (bsc#1232352).
* CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used
(bsc#1232355).
* CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1
(bsc#1232358).
* CVE-2024-49901: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid
nullptrs (bsc#1232305).
* CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in
dcn32_set_output_transfer_func (bsc#1232337).
* CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in
dcn20_set_output_transfer_func (bsc#1232366).
* CVE-2024-49912: drm/amd/display: Handle null 'stream_status' in
'planes_changed_for_existing_stream' (bsc#1232367).
* CVE-2024-49913: drm/amd/display: Add null check for top_pipe_to_program in
commit_planes_for_stream (bsc#1232307).
* CVE-2024-49921: drm/amd/display: Check null pointers before used
(bsc#1232371).
* CVE-2024-49922: drm/amd/display: Check null pointers before using them
(bsc#1232374).
* CVE-2024-49923: drm/amd/display: Pass non-null to
dcn20_validate_apply_pipe_split_flags (bsc#1232361).
* CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
(bsc#1232224)
* CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
* CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
dentry.d_name.name (bsc#1232387).
* CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in
sctp_listen_start (bsc#1232166).
* CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
associated structure (bsc#1232165).
* CVE-2024-49952: netfilter: nf_tables: prevent nf_skb_duplicated corruption
(bsc#1232157).
* CVE-2024-49959: jbd2: stop waiting for space when
jbd2_cleanup_journal_tail() returns error (bsc#1232149).
* CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted
with siphash (bsc#1232264).
* CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
double-free (bsc#1232096).
* CVE-2024-49987: bpftool: Fix undefined behavior in qsort(NULL, 0, ...)
(bsc#1232258).
* CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
unload (bsc#1232483).
* CVE-2024-50003: drm/amd/display: Fix system hang while resume with TBT
monitor (bsc#1232385).
* CVE-2024-50004: drm/amd/display: update DML2 policy
EnhancedPrefetchScheduleAccelerationFinal DCN35 (bsc#1232396).
* CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate()
(bsc#1232442).
* CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return
value (bsc#1232318).
* CVE-2024-50012: cpufreq: Avoid a bad reference count on CPU node
(bsc#1232386).
* CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path
(bsc#1232446).
* CVE-2024-50015: ext4: dax: fix overflowing extents beyond inode size when
partially writing (bsc#1232079).
* CVE-2024-50080: ublk: do not allow user copy for unprivileged device
(bsc#1232502).
* CVE-2024-50081: blk-mq: setup queue ->tag_set before initializing hctx
(bsc#1232501).
* CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
rq_qos_wake_function race (bsc#1232500).
* CVE-2024-50084: net: microchip: vcap api: Fix memory leaks in
vcap_api_encode_rule_test() (bsc#1232494).
* CVE-2024-50087: btrfs: fix uninitialized pointer free on
read_alloc_one_name() error (bsc#1232499).
* CVE-2024-50088: btrfs: fix uninitialized pointer free in add_inode_ref()
(bsc#1232498).
* CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
(bsc#1232881).
* CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
(bsc#1232885).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232926).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
* CVE-2024-50130: netfilter: bpf: must hold reference on net namespace
(bsc#1232894).
* CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
* CVE-2024-50139: KVM: arm64: Fix shift-out-of-bounds bug (bsc#1233062).
* CVE-2024-50145: octeon_ep: add SKB allocation failures handling in
__octep_oq_process_rx() (bsc#1233044).
* CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
target_alloc_device() (bsc#1233061).
* CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink()
(bsc#1233070).
* CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices
(bsc#1233050).
* CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
(bsc#1233049).
* CVE-2024-50169: vsock: Update rx_bytes on read_skb() (bsc#1233320).
* CVE-2024-50171: net: systemport: fix potential memory leak in
bcm_sysport_xmit() (bsc#1233057).
* CVE-2024-50177: drm/amd/display: fix a UBSAN warning in DML2.1
(bsc#1233115).
* CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
map (bsc#1233129).
* CVE-2024-50184: virtio_pmem: Check device status before requesting flush
(bsc#1233135).
* CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails
(bsc#1233110).
* CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE
(bsc#1233106).
* CVE-2024-50225: btrfs: fix error propagation of split bios (bsc#1233193).
* CVE-2024-50228: mm: shmem: fix data-race in shmem_getattr() (bsc#1233204).
* CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
flag (bsc#1233206).
* CVE-2024-50245: fs/ntfs3: Fix possible deadlock in mi_read (bsc#1233203).
* CVE-2024-50246: fs/ntfs3: Add rough attr alloc_size check (bsc#1233207).
* CVE-2024-50248: ntfs3: add bounds checking to mi_enum_attr() (bsc#1233219).
* CVE-2024-50250: fsdax: dax_unshare_iter needs to copy entire blocks
(bsc#1233226).
* CVE-2024-50252: mlxsw: spectrum_ipip: Fix memory leak when changing remote
IPv6 address (bsc#1233201).
* CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233244).
* CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
packet (bsc#1233253).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
* CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
the list (bsc#1233462).
* CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).
* CVE-2024-50275: arm64/sve: Discard stale CPU state when handling SVE traps
(bsc#1233464).
* CVE-2024-50276: net: vertexcom: mse102x: Fix possible double free of TX skb
(bsc#1233465).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
* CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single
(bsc#1233484).
* CVE-2024-50296: net: hns3: fix kernel crash when uninstalling driver
(bsc#1233485).
* CVE-2024-50298: net: enetc: allocate vf_state during PF probes
(bsc#1233487).
* CVE-2024-53042: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
ip_tunnel_init_flow() (bsc#1233540).
* CVE-2024-53043: mctp i2c: handle NULL header address (bsc#1233523).
* CVE-2024-53048: ice: fix crash on probe for DPLL enabled E810 LOM
(bsc#1233721).
* CVE-2024-53051: drm/i915/hdcp: Add encoder check in
intel_hdcp_get_capability (bsc#1233547).
* CVE-2024-53055: wifi: iwlwifi: mvm: fix 6 GHz scan construction
(bsc#1233550).
* CVE-2024-53056: drm/mediatek: Fix potential NULL dereference in
mtk_crtc_destroy() (bsc#1233568).
* CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged
SKB data (bsc#1233552).
* CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
(bsc#1233570).
* CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233573).
* CVE-2024-53095: smb: client: Fix use-after-free of network namespace
(bsc#1233642).
* CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).
* CVE-2024-53121: net/mlx5: fs, lock FTE when checking if active
(bsc#1234078).
* CVE-2024-53138: net/mlx5e: kTLS, Fix incorrect page refcounting
(bsc#1234223).
The following non-security bugs were fixed:
* Documentation: kgdb: Correct parameter error (git-fixes).
* Drop OCFS2 patch causing a regression (bsc#1233255)
* Move upstreamed crypto patches into sorted section
* Move upstreamed patches into sorted section
* Revert "KVM: PPC: Book3S HV Nested: Stop forwarding all HFUs to L1"
(bsc#1215199).
* Revert "RDMA/core: Fix ENODEV error for iWARP test over vlan" (git-fixes)
* Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline"
(bsc#1234108).
* Revert "cpufreq: brcmstb-avs-cpufreq: Fix initial command check" (stable-
fixes).
* Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git-
fixes).
* Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git-
fixes).
* Update config files (bsc#1218644). LIVEPATCH_IPA_CLONES=n => LIVEPATCH=n
* Update config files. Enabled IDPF for ARM64 (bsc#1221309)
* accel: Use XArray instead of IDR for minors (jsc#PED-11580).
* accel: Use XArray instead of IDR for minors (jsc#PED-11580).
* acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block()
(git-fixes).
* acpi: CPPC: Fix _CPC register setting issue (git-fixes).
* ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
* add bugreference to a hv_netvsc patch (bsc#1232413).
* aes-gcm-p10: Use the correct bit to test for P10 (bsc#1232704).
* alsa: 6fire: Release resources at card release (git-fixes).
* alsa: ac97: bus: Fix the mistake in the comment (git-fixes).
* alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
* alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-
fixes).
* alsa: hda/conexant: fix Z60MR100 startup pop issue (stable-fixes).
* alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
* alsa: hda/realtek - update set GPIO3 to default for Thinkpad with ALC1318
(git-fixes).
* alsa: hda/realtek: Add support for Samsung Galaxy Book3 360 (NP730QFG)
(stable-fixes).
* alsa: hda/realtek: Apply quirk for Medion E15433 (bsc#1233298).
* alsa: hda/realtek: Enable mute and micmute LED on HP ProBook 430 G8 (stable-
fixes).
* alsa: hda/realtek: Enable speaker pins for Medion E15443 platform
(bsc#1233298).
* alsa: hda/realtek: Fix Internal Speaker and Mic boost of Infinix Y4 Max
(bsc#1233298).
* alsa: hda/realtek: Set PCBeep to default value for ALC274 (stable-fixes).
* alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).
* alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).
* alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-
fixes).
* alsa: hda: Poll jack events for LS7A HD-Audio (stable-fixes).
* alsa: hda: Show the codec quirk info at probing (stable-fixes).
* alsa: ice1712: Remove redundant code in stac9460_dac_vol_put (stable-fixes).
* alsa: pcm: Add sanity NULL check for the default mmap fault handler (stable-
fixes).
* alsa: ump: Fix evaluation of MIDI 1.0 FB info (git-fixes).
* alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
* alsa: usb-audio: Add Pioneer DJ/AlphaTheta DJM-A9 Mixer (stable-fixes).
* alsa: usb-audio: Fix Yamaha P-125 Quirk Entry (stable-fixes).
* alsa: usb-audio: Fix a DMA to stack memory bug (git-fixes).
* alsa: usb-audio: Fix out of bounds reads when finding clock sources (stable-
fixes).
* alsa: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox
devices (git-fixes).
* alsa: usb-audio: Make mic volume workarounds globally applicable (stable-
fixes).
* alsa: usb-audio: Use snprintf instead of sprintf in build_mixer_unit_ctl
(stable-fixes).
* alsa: usb-audio: add mixer mapping for Corsair HS80 (stable-fixes).
* alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
* amd-pstate: Set min_perf to nominal_perf for active mode performance gov
(git-fixes).
* apparmor: fix 'Do simple duplicate message elimination' (git-fixes).
* apparmor: test: Fix memory leak for aa_unpack_strdup() (git-fixes).
* apparmor: use kvfree_sensitive to free data->data (git-fixes).
* arm64: dts: allwinner: pinephone: Add mount matrix to accelerometer (git-
fixes)
* arm64: dts: freescale: imx8mm-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: freescale: imx8mp-verdin: Fix SD regulator startup delay (git-
fixes)
* arm64: dts: imx8-ss-vpu: Fix imx8qm VPU IRQs (git-fixes)
* arm64: dts: imx8qxp: Add VPU subsystem file (git-fixes)
* arm64: dts: imx93: add nvmem property for eqos (git-fixes)
* arm64: dts: imx93: add nvmem property for fec1 (git-fixes)
* arm64: dts: imx93: add ocotp node (git-fixes)
* arm64: dts: rockchip: Add DTS for FriendlyARM NanoPi R2S Plus (git-fixes)
* arm64: dts: rockchip: Correct GPIO polarity on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards (git-fixes)
* arm64: dts: rockchip: Fix bluetooth properties on rk3566 box demo (git-
fixes)
* arm64: dts: rockchip: Fix reset-gpios property on brcm BT nodes (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on (git-fixes)
* arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-eaidk-610 (git-
fixes)
* arm64: dts: rockchip: Fix wakeup prop names on PineNote BT node (git-fixes)
* arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma (git-
fixes)
* arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328 (git-fixes)
* arm64: dts: rockchip: Remove undocumented supports-emmc property (git-fixes)
* arm64: dts: rockchip: fix i2c2 pinctrl-names property on (git-fixes)
* arm64: dts: rockchip: remove num-slots property from (git-fixes)
* arm64: dts: rockchip: remove orphaned pinctrl-names from pinephone (git-
fixes)
* arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
* arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-
fixes)
* arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
* arm64: tegra: Move AGX Orin nodes to correct location (git-fixes)
* arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-
fixes)
* asoc: Intel: avs: da7219: Remove suspend_pre() and resume_post() (stable-
fixes).
* asoc: SOF: Add i2s bt dai configuration support for AMD platforms
(bsc#1233305).
* asoc: SOF: Add support for configuring PDM interface from topology
(bsc#1233305).
* asoc: SOF: Deprecate invalid enums in IPC3 (bsc#1233305).
* asoc: SOF: IPC4: get pipeline priority from topology (bsc#1233305).
* asoc: SOF: IPC4: synchronize fw_config_params with fw definitions
(bsc#1233305).
* asoc: SOF: Refactor sof_i2s_tokens reading to update acpbt dai
(bsc#1233305).
* asoc: SOF: Rename amd_bt sof_dai_type (bsc#1233305).
* asoc: SOF: Wire up buffer flags (bsc#1233305).
* asoc: SOF: add alignment for topology header file struct definition
(bsc#1233305).
* asoc: SOF: align topology header file with sof topology header
(bsc#1233305).
* asoc: SOF: ipc3-topology: Convert the topology pin index to ALH dai index
(git-fixes).
* asoc: SOF: ipc3-topology: fix resource leaks in
sof_ipc3_widget_setup_comp_dai() (git-fixes).
* asoc: SOF: ipc4-control: Add support for ALSA enum control (bsc#1233305).
* asoc: SOF: ipc4-control: Add support for ALSA switch control (bsc#1233305).
* asoc: SOF: ipc4-mtrace: move debug slot related definitions to header.h
(bsc#1233305).
* asoc: SOF: ipc4-topology: Add deep buffer size to debug prints
(bsc#1233305).
* asoc: SOF: ipc4-topology: Add definition for generic switch/enum control
(bsc#1233305).
* asoc: SOF: ipc4-topology: Add module ID print during module set up
(bsc#1233305).
* asoc: SOF: ipc4-topology: Helper to find an swidget by module/instance id
(bsc#1233305).
* asoc: SOF: ipc4-topology: Only handle dai_config with HW_PARAMS for ChainDMA
(bsc#1233305).
* asoc: SOF: ipc4-topology: change chain_dma handling in dai_config
(bsc#1233305).
* asoc: SOF: ipc4-topology: export sof_ipc4_copier_is_single_format
(bsc#1233305).
* asoc: SOF: ipc4-topology: set config_length based on device_count
(bsc#1233305).
* asoc: SOF: ipc4: Add data struct for module notification message from
firmware (bsc#1233305).
* asoc: SOF: ipc4: Add new message type: SOF_IPC4_GLB_LOAD_LIBRARY_PREPARE
(bsc#1233305).
* asoc: SOF: sof-client-probes-ipc4: Set param_size extension bits (git-
fixes).
* asoc: SOF: topology: Parse DAI type token for dspless mode (bsc#1233305).
* asoc: SOF: topology: dynamically allocate and store DAI widget->private
(bsc#1233305).
* asoc: amd: yc: Add quirk for ASUS Vivobook S15 M3502RA (stable-fixes).
* asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
* asoc: amd: yc: Fix non-functional mic on ASUS E1404FA (stable-fixes).
* asoc: amd: yc: Support dmic on another model of Lenovo Thinkpad E14 Gen 6
(stable-fixes).
* asoc: amd: yc: fix internal mic on Xiaomi Book Pro 14 2022 (stable-fixes).
* asoc: audio-graph-card2: Purge absent supplies for device tree nodes
(stable-fixes).
* asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
(git-fixes).
* asoc: fsl_micfil: Add sample rate constraint (stable-fixes).
* asoc: fsl_micfil: fix regmap_write_bits usage (git-fixes).
* asoc: mediatek: mt8188-mt6359: Remove hardcoded dmic codec (git-fixes).
* asoc: rt722-sdca: Remove logically deadcode in rt722-sdca.c (git-fixes).
* asoc: rt722-sdca: increase clk_stop_timeout to fix clock stop issue (stable-
fixes).
* asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-
fixes).
* asoc: stm: Prevent potential division by zero in stm32_sai_get_clk_div()
(stable-fixes).
* asoc: stm: Prevent potential division by zero in stm32_sai_mclk_round_rate()
(stable-fixes).
* asoc: tas2781: Add new driver version for tas2563 & tas2781 qfn chip
(stable-fixes).
* bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-
fixes).
* bluetooth: btintel: Direct exception event to bluetooth stack (git-fixes).
* bluetooth: btnxpuart: Resolve TX timeout error in power save stress test
(bsc#1230557)
* bluetooth: fix use-after-free in device_for_each_child() (git-fixes).
* bluetooth: hci_core: Fix calling mgmt_device_connected (git-fixes).
* bpf, arm64: Fix address emission with tag-based KASAN enabled (git-fixes)
* bpf, arm64: Remove garbage frame for struct_ops trampoline (git-fixes)
* bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock (git-
fixes).
* bpf, vsock: Drop static vsock_bpf_prot initialization (git-fixes).
* btrfs: merge btrfs_orig_bbio_end_io() into btrfs_bio_end_io() (bsc#1233193)
* can: c_can: c_can_handle_bus_err(): update statistics if skb allocation
fails (git-fixes).
* can: c_can: fix {rx,tx}_errors statistics (git-fixes).
* can: dev: can_set_termination(): allow sleeping GPIOs (git-fixes).
* can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: hi311x: hi3110_can_ist(): fix potential use-after-free (git-fixes).
* can: hi311x: hi3110_can_ist(): fix {rx,tx}_errors statistics (git-fixes).
* can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).
* can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
* can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-
fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): fix length calculation (git-fixes).
* can: mcp251xfd: mcp251xfd_get_tef_len(): work around erratum DS80000789E 6
(git-fixes).
* can: mcp251xfd: mcp251xfd_ring_alloc(): fix coalescing configuration when
switching CAN modes (git-fixes).
* can: sja1000: sja1000_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
(git-fixes).
* can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
* cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
* clk: clk-apple-nco: Add NULL check in applnco_probe (git-fixes).
* clk: clk-axi-clkgen: make sure to enable the AXI bus clock (git-fixes).
* clk: imx: clk-scu: fix clk enable state save and restore (git-fixes).
* clk: imx: fracn-gppll: correct PLL initialization flow (git-fixes).
* clk: imx: fracn-gppll: fix pll power up (git-fixes).
* clk: imx: lpcg-scu: SW workaround for errata (e10858) (git-fixes).
* clk: qcom: clk-alpha-pll: drop lucid-evo pll enabled warning (git-fixes).
* clk: qcom: clk-alpha-pll: fix lucid 5lpe pll enabled check (git-fixes).
* clk: qcom: gcc-qcs404: fix initial rate of GPLL3 (git-fixes).
* clk: renesas: rzg2l: Fix FOUTPOSTDIV clk (git-fixes).
* clk: sunxi-ng: d1: Fix PLL_AUDIO0 preset (git-fixes).
* comedi: Flush partial mappings in error case (git-fixes).
* cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (git-
fixes).
* cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (git-
fixes).
* cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_cost() (git-fixes).
* cpufreq: CPPC: Fix wrong return value in cppc_get_cpu_power() (git-fixes).
* cpufreq: loongson2: Unregister platform_driver on failure (git-fixes).
* cpufreq: mediatek-hw: Fix wrong return value in mtk_cpufreq_get_cpu_power()
(git-fixes).
* crypto: aes-gcm-p10 - Use the correct bit to test for P10 (bsc#1232704).
* crypto: api - Fix liveliness check in crypto_alg_tested (stable-fixes).
* crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
* crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
* crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
* crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-
fixes).
* crypto: cavium - Fix the if condition to exit loop after timeout (git-
fixes).
* crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
(git-fixes).
* crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return
-EBUSY (git-fixes).
* crypto: qat - remove check after debugfs_create_dir() (git-fixes).
* crypto: qat - remove faulty arbiter config reset (git-fixes).
* crypto: qat/qat_4xxx - fix off by one in uof_get_name() (git-fixes).
* crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
* cxl: downgrade a warning message to debug level in
cxl_probe_component_regs() (bsc#1229165).
* dma-fence: Fix reference leak on fence merge failure path (git-fixes).
* dma-fence: Use kernel's sort for merging fences (git-fixes).
* doc: rcu: update printed dynticks counter bits (git-fixes).
* drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend()
(git-fixes).
* drm/amd/display: Adjust VSDB parser for replay feature (stable-fixes).
* drm/amd/display: Fix brightness level not retained over reboot (git-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in
dcn20_program_pipe (git-fixes).
* drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp
(git-fixes).
* drm/amd: Add some missing straps from NBIO 7.11.0 (git-fixes).
* drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
* drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-
fixes).
* drm/amdgpu: Adjust debugfs register access permissions (stable-fixes).
* drm/amdgpu: Fix DPX valid mode check on GC 9.4.3 (git-fixes).
* drm/amdgpu: Fix JPEG v4.0.3 register write (git-fixes).
* drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-
fixes).
* drm/amdgpu: fix check in gmc_v9_0_get_vm_pte() (git-fixes).
* drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-
fixes).
* drm/amdkfd: Accounting pdd vram_usage for svm (stable-fixes).
* drm/amdkfd: Fix wrong usage of INIT_WORK() (git-fixes).
* drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: it6505: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: tc358767: Fix link properties discovery (git-fixes).
* drm/bridge: tc358768: Fix DSI command tx (git-fixes).
* drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-
fixes).
* drm/etnaviv: hold GPU lock across perfmon sampling (git-fixes).
* drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/mediatek: Fix child node refcount handling in early exit (git-fixes).
* drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-
fixes).
* drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
(git-fixes).
* drm/msm/dpu: drop LM_3 / LM_4 on MSM8998 (git-fixes).
* drm/msm/dpu: drop LM_3 / LM_4 on SDM845 (git-fixes).
* drm/msm/dpu: on SDM845 move DSPP_3 to LM_5 block (git-fixes).
* drm/msm/gpu: Check the status of registration to PM QoS (git-fixes).
* drm/msm: Fix some typos in comment (git-fixes).
* drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new() (git-fixes).
* drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
* drm/omap: Fix possible NULL dereference (git-fixes).
* drm/panfrost: Add missing OPP table refcnt decremental (git-fixes).
* drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
* drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
* drm/sti: Add __iomem for mixer_dbg_mxn's parameter (git-fixes).
* drm/sti: avoid potential dereference of error pointers (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_gdp_atomic_check (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_hqvdp_atomic_check (git-fixes).
* drm/v3d: Address race-condition in MMU flush (git-fixes).
* drm/v3d: Enable Performance Counters before clearing them (git-fixes).
* drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_atomic_flush (git-
fixes).
* drm/vc4: Match drm_dev_enter and exit calls in vc4_hvs_lut_load (git-fixes).
* drm/vc4: hdmi: Avoid hang with debug registers when suspended (git-fixes).
* drm/vc4: hvs: Correct logic on stopping an HVS channel (git-fixes).
* drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
* drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-
fixes).
* drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-
fixes).
* drm/vkms: Drop unnecessary call to drm_crtc_cleanup() (git-fixes).
* drm/vmwgfx: Limit display layout ioctl array size to
VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
* drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).
* drm: Expand max DRM device number to full MINORBITS (jsc#PED-11580).
* drm: Use XArray instead of IDR for minors (jsc#PED-11580).
* drm: Use XArray instead of IDR for minors (jsc#PED-11580).
* drm: use ATOMIC64_INIT() for atomic64_t (git-fixes).
* drm: xlnx: zynqmp_dpsub: fix hotplug detection (git-fixes).
* drm: zynqmp_kms: Unplug DRM device before removal (git-fixes).
* e1000e: Remove Meteor Lake SMBUS workarounds (git-fixes).
* efi/libstub: Free correct pointer on failure (git-fixes).
* efi/libstub: fix efi_parse_options() ignoring the default command line (git-
fixes).
* efi/libstub: zboot.lds: Discard .discard sections (stable-fixes).
* efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
* ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
* ext4: fix unttached inode after power cut with orphan file feature enabled
(bsc#1234009).
* f2fs: get out of a repeat loop when getting a locked data page
(bsc#1234011).
* fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() (git-
fixes).
* firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (git-
fixes).
* firmware: google: Unregister driver_info on failure (git-fixes).
* firmware_loader: Fix possible resource leak in fw_log_firmware_info() (git-
fixes).
* fs/ntfs3: Add more attributes checks in mi_enum_attr() (bsc#1233207)
* fs/ntfs3: Fixed overflow check in mi_enum_attr() (bsc#1233207)
* fs/ntfs3: Sequential field availability check in mi_enum_attr()
(bsc#1233207)
* fs: Fix uninitialized value issue in from_kuid and from_kgid (git-fixes).
* goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
* gpio: exar: set value when external pull-up or pull-down is present (git-
fixes).
* gpio: zevio: Add missed label initialisation (git-fixes).
* hid: core: zero-initialize the report buffer (git-fixes).
* hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-
fixes).
* hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-
fixes).
* hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
(stable-fixes).
* hid: multitouch: Add support for B2402FVA track point (stable-fixes).
* hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-
fixes).
* hid: wacom: fix when get product name maybe null pointer (git-fixes).
* hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-
fixes).
* hwmon: (nct6775-core) Fix overflows seen when writing limit attributes (git-
fixes).
* hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
* i2c: designware: do not hold SCL low when I2C_DYNAMIC_TAR_UPDATE is not set
(git-fixes).
* i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-
fixes).
* i3c: master: svc: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).
* i40e: fix race condition by adding filter's intermediate sync state (git-
fixes).
* iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
* igb: Disable threaded IRQ for igb_msix_other (git-fixes).
* iio: Fix fwnode_handle in __fwnode_iio_channel_get_by_name() (git-fixes).
* iio: accel: kx022a: Fix raw read format (git-fixes).
* iio: adc: ad7606: Fix typo in the driver name (git-fixes).
* iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
* iio: gts: Fix uninitialized symbol 'ret' (git-fixes).
* iio: gts: fix infinite loop for gain_to_scaletables() (git-fixes).
* iio: light: al3010: Fix an error handling path in al3010_probe() (git-
fixes).
* ima: fix buffer overrun in ima_eventdigest_init_common (git-fixes).
* initramfs: avoid filename buffer overrun (bsc#1232436).
* input: hideep - add missing dependency on REGMAP_I2C (git-fixes).
* input: hycon-hy46xx - add missing dependency on REGMAP_I2C (git-fixes).
* input: xpad - add GameSir T4 Kaleid Controller support (git-fixes).
* input: xpad - add GameSir VID for Xbox One controllers (git-fixes).
* input: xpad - add support for 8BitDo Ultimate 2C Wireless Controller (git-
fixes).
* input: xpad - add support for MSI Claw A1M (git-fixes).
* input: xpad - add support for Machenike G5 Pro Controller (git-fixes).
* input: xpad - fix support for some third-party controllers (git-fixes).
* input: xpad - sort xpad_device by vendor and product ID (git-fixes).
* input: xpad - spelling fixes for "Xbox" (git-fixes).
* intel_idle: add Granite Rapids Xeon support (bsc#1231630).
* intel_idle: fix ACPI _CST matching for newer Xeon platforms (bsc#1231630).
* io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (git-fixes).
* io_uring/sqpoll: close race on waiting for sqring entries (git-fixes).
* irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
* jbd2: Move j_transaction_overhead_buffers into a hole (bsc#1234042).
* jbd2: avoid infinite transaction commit loop (bsc#1234039).
* jbd2: avoid memleak in jbd2_journal_write_metadata_buffer (bsc#1234043).
* jbd2: avoid mount failed when commit block is partial submitted
(bsc#1234040).
* jbd2: correct the printing of write_flags in jbd2_write_superblock()
(bsc#1234045).
* jbd2: fix kernel-doc for j_transaction_overhead_buffers (bsc#1234042).
* jbd2: fix potential data lost in recovering journal raced with synchronizing
fs bdev (bsc#1234044).
* jbd2: fix soft lockup in journal_finish_inode_data_buffers() (bsc#1234046).
* jbd2: make jbd2_journal_get_max_txn_bufs() internal (bsc#1234041).
* jbd2: precompute number of transaction descriptor blocks (bsc#1234042).
* kABI workaround for ASoC SOF (bsc#1233305).
* kABI: Restore exported __arm_smccc_sve_check (git-fixes)
* kabi, mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-
fixes kabi).
* kasan: move checks to do_strncpy_from_user (git-fixes).
* kernel-binary: Enable livepatch package only when livepatch is enabled
Otherwise the filelist may be empty failing the build (bsc#1218644).
* kexec_file: fix elfcorehdr digest exclusion when CONFIG_CRASH_HOTPLUG=y
(git-fixes).
* kvm: PPC: Book3S HV: Avoid returning to nested hypervisor on pending
doorbells (bsc#1215199).
* kvm: PPC: Book3S HV: Stop using vc->dpdes for nested KVM guests
(bsc#1215199).
* kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).
* kvm: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests
(bsc#1232207).
* kvm: SEV-ES: Prevent MSR access post VMSA encryption (bsc#1232207).
* leds: lp55xx: Remove redundant test for invalid channel number (git-fixes).
* lib: string_helpers: silence snprintf() output truncation warning (git-
fixes).
* mailbox: arm_mhuv2: clean up loop in get_irq_chan_comb() (git-fixes).
* maple_tree: fix alloc node fail issue (git-fixes).
* maple_tree: refine mas_store_root() on storing NULL (git-fixes).
* media: adv7604: prevent underflow condition when reporting colorspace (git-
fixes).
* media: amphion: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* media: amphion: Set video drvdata before register video device (git-fixes).
* media: ar0521: do not overflow when checking PLL values (git-fixes).
* media: atomisp: Add check for rgby_data memory allocation failure (git-
fixes).
* media: bttv: use audio defaults for winfast2000 (git-fixes).
* media: core: v4l2-ioctl: check if ioctl is known to avoid NULL name (git-
fixes).
* media: cx24116: prevent overflows on SNR calculus (git-fixes).
* media: dvb_frontend: do not play tricks with underflow values (git-fixes).
* media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set (stable-
fixes).
* media: dvbdev: prevent the risk of out of memory access (git-fixes).
* media: gspca: ov534-ov772x: Fix off-by-one error in set_frame_rate() (git-
fixes).
* media: i2c: dw9768: Fix pm_runtime_set_suspended() with runtime pm enabled
(git-fixes).
* media: i2c: tc358743: Fix crash in the probe error path when using polling
(git-fixes).
* media: imx-jpeg: Ensure power suppliers be suspended before detach them
(git-fixes).
* media: imx-jpeg: Set video drvdata before register video device (git-fixes).
* media: mantis: remove orphan mantis_core.h (git-fixes).
* media: mtk-jpeg: Fix null-ptr-deref during unload module (git-fixes).
* media: platform: allegro-dvt: Fix possible memory leak in
allocate_buffers_internal() (git-fixes).
* media: platform: exynos4-is: Fix an OF node reference leak in
fimc_md_is_isp_available (git-fixes).
* media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
* media: s5p-jpeg: prevent buffer overflows (git-fixes).
* media: stb0899_algo: initialize cfr before using it (git-fixes).
* media: ts2020: fix null-ptr-deref in ts2020_probe() (git-fixes).
* media: uvcvideo: Require entities to have a non-zero unique ID (git-fixes).
* media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in
uvc_parse_format (git-fixes).
* media: uvcvideo: Stop stream during unregister (git-fixes).
* media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
* media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
* media: vb2: Fix comment (git-fixes).
* media: venus: Fix pm_runtime_set_suspended() with runtime pm enabled (git-
fixes).
* media: videobuf2: fix typo: vb2_dbuf -> vb2_qbuf (git-fixes).
* media: wl128x: Fix atomicity violation in fmc_send_cmd() (git-fixes).
* mfd: rt5033: Fix missing regmap_del_irq_chip() (git-fixes).
* mfd: tps65010: Use IRQF_NO_AUTOEN flag in request_irq() to fix race (git-
fixes).
* minmax: scsi: fix mis-use of 'clamp()' in sr.c (git-fixes).
* misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
* mlxbf_gige: disable RX filters until RX path initialized (git-fixes).
* mm/hugetlb: fix nodes huge page allocation when there are surplus pages
(bsc#1234012).
* mm: avoid unsafe VMA hook invocation when error arises on mmap hook (git-
fixes).
* mm: move dummy_vm_ops out of a header (git-fixes prerequisity).
* mm: refactor arch_calc_vm_flag_bits() and arm64 MTE handling (git-fixes).
* mm: refactor map_deny_write_exec() (git-fixes).
* mm: resolve faulty mmap_region() error path behaviour (git-fixes).
* mm: unconditionally close VMAs on error (git-fixes).
* mmc: core: Further prevent card detect during shutdown (git-fixes).
* mmc: mmc_spi: drop buggy snprintf() (git-fixes).
* mmc: sunxi-mmc: Fix A100 compatible description (git-fixes).
* modpost: remove incorrect code in do_eisa_entry() (git-fixes).
* mtd: rawnand: atmel: Fix possible memory leak (git-fixes).
* mtd: spi-nor: core: replace dummy buswidth from addr to data (git-fixes).
* net: mdio-ipq4019: add missing error check (git-fixes).
* net: phy: dp83822: Fix reset pin definitions (git-fixes).
* net: phy: ti: add PHY_RST_AFTER_CLK_EN flag (git-fixes).
* net: relax socket state check at accept time (git-fixes).
* net: usb: lan78xx: Fix double free issue with interrupt buffer allocation
(git-fixes).
* net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
(git-fixes).
* net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
configuration (git-fixes).
* net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
* net: wwan: fix global oob in wwan_rtnl_policy (git-fixes).
* net: wwan: t7xx: Fix off-by-one error in t7xx_dpmaif_rx_buf_alloc() (git-
fixes).
* net: xfrm: preserve kabi for xfrm_state (bsc#1233754).
* netdevsim: copy addresses for both in and out paths (git-fixes).
* netfilter: nf_tables: missing iterator type in lookup walk (git-fixes).
* nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
* nfs: avoid i_lock contention in nfs_clear_invalid_mapping (git-fixes).
* nfs: remove revoked delegation from server's delegation list (git-fixes).
* nfsd: remove unsafe BUG_ON from set_change_info (bsc#1234121).
* nilfs2: fix potential deadlock with newly created symlinks (git-fixes).
* nouveau/dp: handle retries for AUX CH transfers with GSP (git-fixes).
* nouveau: fw: sync dma after setup is called (git-fixes).
* nouveau: handle EBUSY and EAGAIN for GSP aux errors (git-fixes).
* ntfs3: Add bounds checking to mi_enum_attr() (bsc#1233207)
* nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
* nvme-loop: flush off pending I/O while shutting down loop controller (git-
fixes).
* nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
* nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
* nvme/host: Fix RCU list traversal to use SRCU primitive (git-fixes).
* nvme: tcp: avoid race between queue_lock lock and destroy (git-fixes).
* ocfs2: fix UBSAN warning in ocfs2_verify_volume() (git-fixes).
* ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove() (git-fixes).
* ocfs2: uncache inode which has failed entering the group (git-fixes).
* of: Add cleanup.h based auto release via __free(device_node) markings
(bsc#1232386)
* pci: Add T_PVPERL macro (git-fixes).
* pci: Fix reset_method_store() memory leak (git-fixes).
* pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf()
(git-fixes).
* pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds
(git-fixes).
* pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
* pci: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible
(git-fixes).
* pci: rockchip-ep: Fix address translation unit programming (git-fixes).
* pinctrl: k210: Undef K210_PC_DEFAULT (git-fixes).
* pinctrl: qcom: spmi: fix debugfs drive strength (git-fixes).
* pinctrl: zynqmp: drop excess struct member description (git-fixes).
* platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-
fixes).
* platform/x86/amd/pmc: Detect when STB is not available (git-fixes).
* platform/x86: panasonic-laptop: Return errno correctly in show callback
(git-fixes).
* posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
* power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
* power: supply: core: Remove might_sleep() from power_supply_put() (git-
fixes).
* power: supply: rt9471: Fix wrong WDT function regfield declaration (git-
fixes).
* power: supply: rt9471: Use IC status regfield to report real charger status
(git-fixes).
* powerpc/64s: Fix unnecessary copy to 0 when kernel is booted at address 0
(bsc#1215199).
* powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
* powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init()
(bsc#1215199).
* powerpc/fadump: Refactor and prepare fadump_cma_init for late init
(bsc#1215199).
* powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
* powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
* powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
* powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).
* powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
* powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector
(bsc#1194869).
* powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
* powerpc/pseries: Use correct data types from pseries_hp_errorlog struct
(bsc#1215199).
* powerpc/vdso: Inconditionally use CFUNC macro (bsc#1215199).
* pwm: imx-tpm: Use correct MODULO value for EPWM mode (git-fixes).
* rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
* rdma/hns: Add mutex_destroy() (git-fixes)
* rdma/hns: Disassociate mmap pages for all uctx when HW is being reset (git-
fixes)
* rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
* rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci
(git-fixes)
* rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)
* rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
* rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
* rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
* rdma/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes)
* rdma/hns: Use macro instead of magic number (git-fixes)
* rdma/mlx5: Move events notifier registration to be after device registration
(git-fixes)
* rdma/rxe: Fix the qp flush warnings in req (git-fixes)
* rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
* rdma/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES (git-fixes)
* regmap: detach regmap from dev on regmap_exit (git-fixes).
* regmap: irq: Set lockdep class for hierarchical IRQ domains (git-fixes).
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation. (bsc#1218644)
* rtc: ab-eoz9: do not fail temperature reads on undervoltage notification
(git-fixes).
* rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
* rtc: bbnsm: add remove hook (git-fixes).
* rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-
fixes).
* rtc: rzn1: fix BCD to rtc_time conversion errors (git-fixes).
* rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
* scsi: NCR5380: Initialize buffer for MSG IN and STATUS transfers (git-
fixes).
* scsi: Remove scsi device no_start_on_resume flag (git-fixes).
* scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
* scsi: cdrom: kABI: fix cdrom_dev_ops change (git-fixes).
* scsi: core: Disable CDL by default (git-fixes).
* scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING (git-fixes).
* scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
* scsi: core: Handle devices which return an unusually large VPD page count
(git-fixes).
* scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
* scsi: hisi_sas: Handle the NCQ error returned by D2H frame (git-fixes).
* scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
* scsi: kABI: restore no_start_on_resume to scsi_device (git-fixes).
* scsi: libsas: Fix exp-attached device scan after probe failure scanned in
again after probe failed (git-fixes).
* scsi: libsas: Fix the failure of adding phy with zero-address to port (git-
fixes).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241
jsc#PED-9943).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241 jsc#PED-9943).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241 jsc#PED-9943).
* scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
* scsi: mac_scsi: Refactor polling loop (git-fixes).
* scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
* scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (git-fixes).
* scsi: mpi3mr: Avoid possible run-time warning with long manufacturer strings
(git-fixes).
* scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
* scsi: mpi3mr: Validate SAS port assignments (git-fixes).
* scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
* scsi: pm8001: Do not overwrite PCI queue mapping (git-fixes).
* scsi: pm80xx: Set phy->enable_completion only when we wait for it (git-
fixes).
* scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
* scsi: scsi_transport_fc: Allow setting rport state to current state (git-
fixes).
* scsi: sd: Ignore command SYNCHRONIZE CACHE error if format in progress (git-
fixes).
* scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
* scsi: smartpqi: correct stream detection (git-fixes).
* scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-
fixes).
* scsi: spi: Fix sshdr use (git-fixes).
* scsi: sr: Fix unintentional arithmetic wraparound (git-fixes).
* scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
* security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
* serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
* signal: Replace BUG_ON()s (bsc#1234093).
* soc: fsl: rcpm: fix missing of_node_put() in copy_ippdexpcr1_setting() (git-
fixes).
* soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() (git-
fixes).
* soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* spi: Fix acpi deferred irq probe (git-fixes).
* spi: atmel-quadspi: Fix register name in verbose logging function (git-
fixes).
* spi: mpc52xx: Add cancel_work_sync before module remove (git-fixes).
* spi: tegra210-quad: Avoid shift-out-of-bounds (git-fixes).
* sunrpc: Remove BUG_ON call sites (git-fixes).
* tcp: Fix refcnt handling in __inet_hash_connect() (git-fixes).
* thermal: core: Initialize thermal zones before registering them (git-fixes).
* thermal: int3400: Fix reading of current_uuid for active policy (git-fixes).
* thermal: intel: int340x: processor: Fix warning during module unload (git-
fixes).
* thunderbolt: Honor TMU requirements in the domain when setting TMU mode
(stable-fixes).
* tools/lib/thermal: Fix sampling handler context ptr (git-fixes).
* tools/power turbostat: Fix trailing '\n' parsing (git-fixes).
* tools/power turbostat: Increase the limit for fd opened (bsc#1233119).
* tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
* tpm: fix signed/unsigned bug when checking event logs (git-fixes).
* tty: ldsic: fix tty_ldisc_autoload sysctl's proc_handler (git-fixes).
* u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file
(git-fixes).
* ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
* unicode: Fix utf8_load() error path (git-fixes).
* usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
* usb: chaoskey: fail open after removal (git-fixes).
* usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing
logic (git-fixes).
* usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
* usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
* usb: ehci-spear: fix call balance of sehci clk handling routines (git-
fixes).
* usb: gadget: dummy-hcd: Fix "task hung" problem (git-fixes).
* usb: gadget: dummy_hcd: Set transfer interval to 1 microframe (stable-
fixes).
* usb: gadget: dummy_hcd: Switch to hrtimer transfer scheduler (stable-fixes).
* usb: gadget: dummy_hcd: execute hrtimer callback in softirq context (git-
fixes).
* usb: musb: Fix hardware lockup on first Rx endpoint request (git-fixes).
* usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
* usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-
fixes).
* usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).
* usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
* usb: serial: option: add Quectel RG650V (stable-fixes).
* usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-
fixes).
* usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
(git-fixes).
* usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
(git-fixes).
* usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
* usb: yurex: make waiting on yurex_write interruptible (git-fixes).
* vsock: Update msg_count on read_skb() (git-fixes).
* watchdog: apple: Actually flush writes after requesting watchdog restart
(git-fixes).
* watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).
* watchdog: rti: of: honor timeout-sec property (git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
(git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
(git-fixes).
* wifi: ath11k: Fix CE offset address calculation for WCN6750 in SSR (git-
fixes).
* wifi: ath12k: Skip Rx TID cleanup for self peer (git-fixes).
* wifi: ath12k: fix crash when unbinding (git-fixes).
* wifi: ath12k: fix warning when unbinding (git-fixes).
* wifi: ath12k: remove msdu_end structure for WCN7850 (git-fixes).
* wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
(git-fixes).
* wifi: brcmfmac: release 'root' node in all execution paths (git-fixes).
* wifi: cw1200: Fix potential NULL dereference (git-fixes).
* wifi: iwlegacy: Clear stale interrupts before resuming device (stable-
fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan() (git-fixes).
* wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: wfx: Fix error handling in wfx_core_init() (git-fixes).
* x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client (bsc#1233443).
* x86/microcode/intel: Remove unnecessary cache writeback and invalidation
(git-fixes).
* x86/resctrl: Remove hard-coded memory bandwidth limit (git-fixes).
* x86/syscall: Avoid memcpy() for ia32 syscall_get_arguments() (git-fixes).
* x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes).
* x86/tdx: Enable CPU topology enumeration (git-fixes).
* x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes).
* x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes).
* x86/traps: move kmsan check after instrumentation_begin (git-fixes).
* x86: Increase brk randomness entropy for 64-bit systems (git-fixes).
* x86: fix off-by-one in access_ok() (git-fixes).
* xfrm: Export symbol xfrm_dev_state_delete (bsc#1233754).
* xfrm: Fix unregister netdevice hang on hardware offload (bsc#1233754).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4314=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-4314=1
* SUSE Real Time Module 15-SP6
zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2024-4314=1
## Package List:
* openSUSE Leap 15.6 (x86_64)
* kernel-rt_debug-debugsource-6.4.0-150600.10.20.1
* kselftests-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt_debug-vdso-6.4.0-150600.10.20.1
* kernel-rt-devel-6.4.0-150600.10.20.1
* cluster-md-kmp-rt-6.4.0-150600.10.20.1
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt_debug-devel-6.4.0-150600.10.20.1
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* ocfs2-kmp-rt-6.4.0-150600.10.20.1
* kernel-rt-debugsource-6.4.0-150600.10.20.1
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.20.1
* reiserfs-kmp-rt-6.4.0-150600.10.20.1
* kernel-rt-devel-debuginfo-6.4.0-150600.10.20.1
* dlm-kmp-rt-6.4.0-150600.10.20.1
* kernel-rt_debug-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-optional-6.4.0-150600.10.20.1
* kernel-rt-extra-6.4.0-150600.10.20.1
* reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-extra-debuginfo-6.4.0-150600.10.20.1
* kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-vdso-6.4.0-150600.10.20.1
* kernel-rt-vdso-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-optional-debuginfo-6.4.0-150600.10.20.1
* kernel-syms-rt-6.4.0-150600.10.20.1
* kernel-rt-debuginfo-6.4.0-150600.10.20.1
* kselftests-kmp-rt-6.4.0-150600.10.20.1
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* gfs2-kmp-rt-6.4.0-150600.10.20.1
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-livepatch-devel-6.4.0-150600.10.20.1
* openSUSE Leap 15.6 (noarch)
* kernel-devel-rt-6.4.0-150600.10.20.1
* kernel-source-rt-6.4.0-150600.10.20.1
* openSUSE Leap 15.6 (nosrc x86_64)
* kernel-rt-6.4.0-150600.10.20.1
* kernel-rt_debug-6.4.0-150600.10.20.1
* SUSE Linux Enterprise Live Patching 15-SP6 (x86_64)
* kernel-livepatch-SLE15-SP6-RT_Update_6-debugsource-1-150600.1.3.1
* kernel-livepatch-6_4_0-150600_10_20-rt-1-150600.1.3.1
* kernel-livepatch-6_4_0-150600_10_20-rt-debuginfo-1-150600.1.3.1
* SUSE Real Time Module 15-SP6 (x86_64)
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt_debug-debugsource-6.4.0-150600.10.20.1
* ocfs2-kmp-rt-6.4.0-150600.10.20.1
* kernel-rt-debugsource-6.4.0-150600.10.20.1
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.20.1
* gfs2-kmp-rt-6.4.0-150600.10.20.1
* kernel-rt-devel-debuginfo-6.4.0-150600.10.20.1
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* cluster-md-kmp-rt-6.4.0-150600.10.20.1
* dlm-kmp-rt-6.4.0-150600.10.20.1
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.20.1
* kernel-rt-devel-6.4.0-150600.10.20.1
* kernel-rt_debug-debuginfo-6.4.0-150600.10.20.1
* kernel-syms-rt-6.4.0-150600.10.20.1
* kernel-rt_debug-devel-6.4.0-150600.10.20.1
* kernel-rt-debuginfo-6.4.0-150600.10.20.1
* SUSE Real Time Module 15-SP6 (noarch)
* kernel-devel-rt-6.4.0-150600.10.20.1
* kernel-source-rt-6.4.0-150600.10.20.1
* SUSE Real Time Module 15-SP6 (nosrc x86_64)
* kernel-rt-6.4.0-150600.10.20.1
* kernel-rt_debug-6.4.0-150600.10.20.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52778.html
* https://www.suse.com/security/cve/CVE-2023-52920.html
* https://www.suse.com/security/cve/CVE-2023-52921.html
* https://www.suse.com/security/cve/CVE-2023-52922.html
* https://www.suse.com/security/cve/CVE-2024-26596.html
* https://www.suse.com/security/cve/CVE-2024-26703.html
* https://www.suse.com/security/cve/CVE-2024-26741.html
* https://www.suse.com/security/cve/CVE-2024-26782.html
* https://www.suse.com/security/cve/CVE-2024-26864.html
* https://www.suse.com/security/cve/CVE-2024-26953.html
* https://www.suse.com/security/cve/CVE-2024-27017.html
* https://www.suse.com/security/cve/CVE-2024-27407.html
* https://www.suse.com/security/cve/CVE-2024-35888.html
* https://www.suse.com/security/cve/CVE-2024-36000.html
* https://www.suse.com/security/cve/CVE-2024-36031.html
* https://www.suse.com/security/cve/CVE-2024-36484.html
* https://www.suse.com/security/cve/CVE-2024-36883.html
* https://www.suse.com/security/cve/CVE-2024-36886.html
* https://www.suse.com/security/cve/CVE-2024-36905.html
* https://www.suse.com/security/cve/CVE-2024-36920.html
* https://www.suse.com/security/cve/CVE-2024-36927.html
* https://www.suse.com/security/cve/CVE-2024-36954.html
* https://www.suse.com/security/cve/CVE-2024-36968.html
* https://www.suse.com/security/cve/CVE-2024-38589.html
* https://www.suse.com/security/cve/CVE-2024-40914.html
* https://www.suse.com/security/cve/CVE-2024-41023.html
* https://www.suse.com/security/cve/CVE-2024-42102.html
* https://www.suse.com/security/cve/CVE-2024-44995.html
* https://www.suse.com/security/cve/CVE-2024-46680.html
* https://www.suse.com/security/cve/CVE-2024-46681.html
* https://www.suse.com/security/cve/CVE-2024-46765.html
* https://www.suse.com/security/cve/CVE-2024-46788.html
* https://www.suse.com/security/cve/CVE-2024-46800.html
* https://www.suse.com/security/cve/CVE-2024-46828.html
* https://www.suse.com/security/cve/CVE-2024-46845.html
* https://www.suse.com/security/cve/CVE-2024-47666.html
* https://www.suse.com/security/cve/CVE-2024-47679.html
* https://www.suse.com/security/cve/CVE-2024-47701.html
* https://www.suse.com/security/cve/CVE-2024-47703.html
* https://www.suse.com/security/cve/CVE-2024-49852.html
* https://www.suse.com/security/cve/CVE-2024-49866.html
* https://www.suse.com/security/cve/CVE-2024-49868.html
* https://www.suse.com/security/cve/CVE-2024-49881.html
* https://www.suse.com/security/cve/CVE-2024-49883.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49894.html
* https://www.suse.com/security/cve/CVE-2024-49895.html
* https://www.suse.com/security/cve/CVE-2024-49897.html
* https://www.suse.com/security/cve/CVE-2024-49899.html
* https://www.suse.com/security/cve/CVE-2024-49901.html
* https://www.suse.com/security/cve/CVE-2024-49905.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49909.html
* https://www.suse.com/security/cve/CVE-2024-49911.html
* https://www.suse.com/security/cve/CVE-2024-49912.html
* https://www.suse.com/security/cve/CVE-2024-49913.html
* https://www.suse.com/security/cve/CVE-2024-49921.html
* https://www.suse.com/security/cve/CVE-2024-49922.html
* https://www.suse.com/security/cve/CVE-2024-49923.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-49933.html
* https://www.suse.com/security/cve/CVE-2024-49934.html
* https://www.suse.com/security/cve/CVE-2024-49944.html
* https://www.suse.com/security/cve/CVE-2024-49945.html
* https://www.suse.com/security/cve/CVE-2024-49952.html
* https://www.suse.com/security/cve/CVE-2024-49959.html
* https://www.suse.com/security/cve/CVE-2024-49968.html
* https://www.suse.com/security/cve/CVE-2024-49975.html
* https://www.suse.com/security/cve/CVE-2024-49976.html
* https://www.suse.com/security/cve/CVE-2024-49983.html
* https://www.suse.com/security/cve/CVE-2024-49987.html
* https://www.suse.com/security/cve/CVE-2024-49989.html
* https://www.suse.com/security/cve/CVE-2024-50003.html
* https://www.suse.com/security/cve/CVE-2024-50004.html
* https://www.suse.com/security/cve/CVE-2024-50006.html
* https://www.suse.com/security/cve/CVE-2024-50009.html
* https://www.suse.com/security/cve/CVE-2024-50012.html
* https://www.suse.com/security/cve/CVE-2024-50014.html
* https://www.suse.com/security/cve/CVE-2024-50015.html
* https://www.suse.com/security/cve/CVE-2024-50026.html
* https://www.suse.com/security/cve/CVE-2024-50067.html
* https://www.suse.com/security/cve/CVE-2024-50080.html
* https://www.suse.com/security/cve/CVE-2024-50081.html
* https://www.suse.com/security/cve/CVE-2024-50082.html
* https://www.suse.com/security/cve/CVE-2024-50084.html
* https://www.suse.com/security/cve/CVE-2024-50087.html
* https://www.suse.com/security/cve/CVE-2024-50088.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50093.html
* https://www.suse.com/security/cve/CVE-2024-50095.html
* https://www.suse.com/security/cve/CVE-2024-50096.html
* https://www.suse.com/security/cve/CVE-2024-50098.html
* https://www.suse.com/security/cve/CVE-2024-50099.html
* https://www.suse.com/security/cve/CVE-2024-50100.html
* https://www.suse.com/security/cve/CVE-2024-50101.html
* https://www.suse.com/security/cve/CVE-2024-50102.html
* https://www.suse.com/security/cve/CVE-2024-50103.html
* https://www.suse.com/security/cve/CVE-2024-50108.html
* https://www.suse.com/security/cve/CVE-2024-50110.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50116.html
* https://www.suse.com/security/cve/CVE-2024-50117.html
* https://www.suse.com/security/cve/CVE-2024-50121.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50128.html
* https://www.suse.com/security/cve/CVE-2024-50130.html
* https://www.suse.com/security/cve/CVE-2024-50131.html
* https://www.suse.com/security/cve/CVE-2024-50134.html
* https://www.suse.com/security/cve/CVE-2024-50135.html
* https://www.suse.com/security/cve/CVE-2024-50136.html
* https://www.suse.com/security/cve/CVE-2024-50138.html
* https://www.suse.com/security/cve/CVE-2024-50139.html
* https://www.suse.com/security/cve/CVE-2024-50141.html
* https://www.suse.com/security/cve/CVE-2024-50145.html
* https://www.suse.com/security/cve/CVE-2024-50146.html
* https://www.suse.com/security/cve/CVE-2024-50147.html
* https://www.suse.com/security/cve/CVE-2024-50148.html
* https://www.suse.com/security/cve/CVE-2024-50150.html
* https://www.suse.com/security/cve/CVE-2024-50153.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50155.html
* https://www.suse.com/security/cve/CVE-2024-50156.html
* https://www.suse.com/security/cve/CVE-2024-50157.html
* https://www.suse.com/security/cve/CVE-2024-50158.html
* https://www.suse.com/security/cve/CVE-2024-50159.html
* https://www.suse.com/security/cve/CVE-2024-50160.html
* https://www.suse.com/security/cve/CVE-2024-50166.html
* https://www.suse.com/security/cve/CVE-2024-50167.html
* https://www.suse.com/security/cve/CVE-2024-50169.html
* https://www.suse.com/security/cve/CVE-2024-50171.html
* https://www.suse.com/security/cve/CVE-2024-50172.html
* https://www.suse.com/security/cve/CVE-2024-50175.html
* https://www.suse.com/security/cve/CVE-2024-50176.html
* https://www.suse.com/security/cve/CVE-2024-50177.html
* https://www.suse.com/security/cve/CVE-2024-50179.html
* https://www.suse.com/security/cve/CVE-2024-50180.html
* https://www.suse.com/security/cve/CVE-2024-50181.html
* https://www.suse.com/security/cve/CVE-2024-50182.html
* https://www.suse.com/security/cve/CVE-2024-50183.html
* https://www.suse.com/security/cve/CVE-2024-50184.html
* https://www.suse.com/security/cve/CVE-2024-50186.html
* https://www.suse.com/security/cve/CVE-2024-50187.html
* https://www.suse.com/security/cve/CVE-2024-50188.html
* https://www.suse.com/security/cve/CVE-2024-50189.html
* https://www.suse.com/security/cve/CVE-2024-50192.html
* https://www.suse.com/security/cve/CVE-2024-50194.html
* https://www.suse.com/security/cve/CVE-2024-50195.html
* https://www.suse.com/security/cve/CVE-2024-50196.html
* https://www.suse.com/security/cve/CVE-2024-50198.html
* https://www.suse.com/security/cve/CVE-2024-50200.html
* https://www.suse.com/security/cve/CVE-2024-50201.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50209.html
* https://www.suse.com/security/cve/CVE-2024-50210.html
* https://www.suse.com/security/cve/CVE-2024-50215.html
* https://www.suse.com/security/cve/CVE-2024-50216.html
* https://www.suse.com/security/cve/CVE-2024-50218.html
* https://www.suse.com/security/cve/CVE-2024-50221.html
* https://www.suse.com/security/cve/CVE-2024-50224.html
* https://www.suse.com/security/cve/CVE-2024-50225.html
* https://www.suse.com/security/cve/CVE-2024-50228.html
* https://www.suse.com/security/cve/CVE-2024-50229.html
* https://www.suse.com/security/cve/CVE-2024-50230.html
* https://www.suse.com/security/cve/CVE-2024-50231.html
* https://www.suse.com/security/cve/CVE-2024-50232.html
* https://www.suse.com/security/cve/CVE-2024-50233.html
* https://www.suse.com/security/cve/CVE-2024-50234.html
* https://www.suse.com/security/cve/CVE-2024-50235.html
* https://www.suse.com/security/cve/CVE-2024-50236.html
* https://www.suse.com/security/cve/CVE-2024-50237.html
* https://www.suse.com/security/cve/CVE-2024-50240.html
* https://www.suse.com/security/cve/CVE-2024-50245.html
* https://www.suse.com/security/cve/CVE-2024-50246.html
* https://www.suse.com/security/cve/CVE-2024-50248.html
* https://www.suse.com/security/cve/CVE-2024-50249.html
* https://www.suse.com/security/cve/CVE-2024-50250.html
* https://www.suse.com/security/cve/CVE-2024-50252.html
* https://www.suse.com/security/cve/CVE-2024-50255.html
* https://www.suse.com/security/cve/CVE-2024-50257.html
* https://www.suse.com/security/cve/CVE-2024-50261.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50265.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50268.html
* https://www.suse.com/security/cve/CVE-2024-50269.html
* https://www.suse.com/security/cve/CVE-2024-50271.html
* https://www.suse.com/security/cve/CVE-2024-50273.html
* https://www.suse.com/security/cve/CVE-2024-50274.html
* https://www.suse.com/security/cve/CVE-2024-50275.html
* https://www.suse.com/security/cve/CVE-2024-50276.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50282.html
* https://www.suse.com/security/cve/CVE-2024-50287.html
* https://www.suse.com/security/cve/CVE-2024-50289.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50292.html
* https://www.suse.com/security/cve/CVE-2024-50295.html
* https://www.suse.com/security/cve/CVE-2024-50296.html
* https://www.suse.com/security/cve/CVE-2024-50298.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53042.html
* https://www.suse.com/security/cve/CVE-2024-53043.html
* https://www.suse.com/security/cve/CVE-2024-53045.html
* https://www.suse.com/security/cve/CVE-2024-53048.html
* https://www.suse.com/security/cve/CVE-2024-53051.html
* https://www.suse.com/security/cve/CVE-2024-53052.html
* https://www.suse.com/security/cve/CVE-2024-53055.html
* https://www.suse.com/security/cve/CVE-2024-53056.html
* https://www.suse.com/security/cve/CVE-2024-53058.html
* https://www.suse.com/security/cve/CVE-2024-53059.html
* https://www.suse.com/security/cve/CVE-2024-53060.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53066.html
* https://www.suse.com/security/cve/CVE-2024-53068.html
* https://www.suse.com/security/cve/CVE-2024-53072.html
* https://www.suse.com/security/cve/CVE-2024-53074.html
* https://www.suse.com/security/cve/CVE-2024-53076.html
* https://www.suse.com/security/cve/CVE-2024-53079.html
* https://www.suse.com/security/cve/CVE-2024-53081.html
* https://www.suse.com/security/cve/CVE-2024-53082.html
* https://www.suse.com/security/cve/CVE-2024-53085.html
* https://www.suse.com/security/cve/CVE-2024-53088.html
* https://www.suse.com/security/cve/CVE-2024-53093.html
* https://www.suse.com/security/cve/CVE-2024-53094.html
* https://www.suse.com/security/cve/CVE-2024-53095.html
* https://www.suse.com/security/cve/CVE-2024-53096.html
* https://www.suse.com/security/cve/CVE-2024-53100.html
* https://www.suse.com/security/cve/CVE-2024-53101.html
* https://www.suse.com/security/cve/CVE-2024-53104.html
* https://www.suse.com/security/cve/CVE-2024-53106.html
* https://www.suse.com/security/cve/CVE-2024-53108.html
* https://www.suse.com/security/cve/CVE-2024-53110.html
* https://www.suse.com/security/cve/CVE-2024-53112.html
* https://www.suse.com/security/cve/CVE-2024-53114.html
* https://www.suse.com/security/cve/CVE-2024-53121.html
* https://www.suse.com/security/cve/CVE-2024-53138.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1082555
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1220355
* https://bugzilla.suse.com/show_bug.cgi?id=1221309
* https://bugzilla.suse.com/show_bug.cgi?id=1222423
* https://bugzilla.suse.com/show_bug.cgi?id=1222587
* https://bugzilla.suse.com/show_bug.cgi?id=1222590
* https://bugzilla.suse.com/show_bug.cgi?id=1223112
* https://bugzilla.suse.com/show_bug.cgi?id=1223656
* https://bugzilla.suse.com/show_bug.cgi?id=1223733
* https://bugzilla.suse.com/show_bug.cgi?id=1224429
* https://bugzilla.suse.com/show_bug.cgi?id=1224518
* https://bugzilla.suse.com/show_bug.cgi?id=1224548
* https://bugzilla.suse.com/show_bug.cgi?id=1224948
* https://bugzilla.suse.com/show_bug.cgi?id=1225713
* https://bugzilla.suse.com/show_bug.cgi?id=1225725
* https://bugzilla.suse.com/show_bug.cgi?id=1225730
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1225764
* https://bugzilla.suse.com/show_bug.cgi?id=1225768
* https://bugzilla.suse.com/show_bug.cgi?id=1225813
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226130
* https://bugzilla.suse.com/show_bug.cgi?id=1226748
* https://bugzilla.suse.com/show_bug.cgi?id=1226872
* https://bugzilla.suse.com/show_bug.cgi?id=1227726
* https://bugzilla.suse.com/show_bug.cgi?id=1227842
* https://bugzilla.suse.com/show_bug.cgi?id=1228430
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1229165
* https://bugzilla.suse.com/show_bug.cgi?id=1230231
* https://bugzilla.suse.com/show_bug.cgi?id=1230557
* https://bugzilla.suse.com/show_bug.cgi?id=1230558
* https://bugzilla.suse.com/show_bug.cgi?id=1230733
* https://bugzilla.suse.com/show_bug.cgi?id=1230807
* https://bugzilla.suse.com/show_bug.cgi?id=1230817
* https://bugzilla.suse.com/show_bug.cgi?id=1230827
* https://bugzilla.suse.com/show_bug.cgi?id=1230971
* https://bugzilla.suse.com/show_bug.cgi?id=1231076
* https://bugzilla.suse.com/show_bug.cgi?id=1231114
* https://bugzilla.suse.com/show_bug.cgi?id=1231182
* https://bugzilla.suse.com/show_bug.cgi?id=1231453
* https://bugzilla.suse.com/show_bug.cgi?id=1231465
* https://bugzilla.suse.com/show_bug.cgi?id=1231630
* https://bugzilla.suse.com/show_bug.cgi?id=1231920
* https://bugzilla.suse.com/show_bug.cgi?id=1231930
* https://bugzilla.suse.com/show_bug.cgi?id=1231946
* https://bugzilla.suse.com/show_bug.cgi?id=1231952
* https://bugzilla.suse.com/show_bug.cgi?id=1232079
* https://bugzilla.suse.com/show_bug.cgi?id=1232096
* https://bugzilla.suse.com/show_bug.cgi?id=1232103
* https://bugzilla.suse.com/show_bug.cgi?id=1232104
* https://bugzilla.suse.com/show_bug.cgi?id=1232149
* https://bugzilla.suse.com/show_bug.cgi?id=1232157
* https://bugzilla.suse.com/show_bug.cgi?id=1232165
* https://bugzilla.suse.com/show_bug.cgi?id=1232166
* https://bugzilla.suse.com/show_bug.cgi?id=1232198
* https://bugzilla.suse.com/show_bug.cgi?id=1232199
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232207
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1232258
* https://bugzilla.suse.com/show_bug.cgi?id=1232259
* https://bugzilla.suse.com/show_bug.cgi?id=1232264
* https://bugzilla.suse.com/show_bug.cgi?id=1232272
* https://bugzilla.suse.com/show_bug.cgi?id=1232305
* https://bugzilla.suse.com/show_bug.cgi?id=1232307
* https://bugzilla.suse.com/show_bug.cgi?id=1232318
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232337
* https://bugzilla.suse.com/show_bug.cgi?id=1232352
* https://bugzilla.suse.com/show_bug.cgi?id=1232354
* https://bugzilla.suse.com/show_bug.cgi?id=1232355
* https://bugzilla.suse.com/show_bug.cgi?id=1232357
* https://bugzilla.suse.com/show_bug.cgi?id=1232358
* https://bugzilla.suse.com/show_bug.cgi?id=1232361
* https://bugzilla.suse.com/show_bug.cgi?id=1232366
* https://bugzilla.suse.com/show_bug.cgi?id=1232367
* https://bugzilla.suse.com/show_bug.cgi?id=1232368
* https://bugzilla.suse.com/show_bug.cgi?id=1232371
* https://bugzilla.suse.com/show_bug.cgi?id=1232374
* https://bugzilla.suse.com/show_bug.cgi?id=1232385
* https://bugzilla.suse.com/show_bug.cgi?id=1232386
* https://bugzilla.suse.com/show_bug.cgi?id=1232387
* https://bugzilla.suse.com/show_bug.cgi?id=1232396
* https://bugzilla.suse.com/show_bug.cgi?id=1232413
* https://bugzilla.suse.com/show_bug.cgi?id=1232416
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232442
* https://bugzilla.suse.com/show_bug.cgi?id=1232446
* https://bugzilla.suse.com/show_bug.cgi?id=1232483
* https://bugzilla.suse.com/show_bug.cgi?id=1232494
* https://bugzilla.suse.com/show_bug.cgi?id=1232498
* https://bugzilla.suse.com/show_bug.cgi?id=1232499
* https://bugzilla.suse.com/show_bug.cgi?id=1232500
* https://bugzilla.suse.com/show_bug.cgi?id=1232501
* https://bugzilla.suse.com/show_bug.cgi?id=1232502
* https://bugzilla.suse.com/show_bug.cgi?id=1232704
* https://bugzilla.suse.com/show_bug.cgi?id=1232757
* https://bugzilla.suse.com/show_bug.cgi?id=1232819
* https://bugzilla.suse.com/show_bug.cgi?id=1232823
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232869
* https://bugzilla.suse.com/show_bug.cgi?id=1232870
* https://bugzilla.suse.com/show_bug.cgi?id=1232873
* https://bugzilla.suse.com/show_bug.cgi?id=1232876
* https://bugzilla.suse.com/show_bug.cgi?id=1232877
* https://bugzilla.suse.com/show_bug.cgi?id=1232878
* https://bugzilla.suse.com/show_bug.cgi?id=1232880
* https://bugzilla.suse.com/show_bug.cgi?id=1232881
* https://bugzilla.suse.com/show_bug.cgi?id=1232884
* https://bugzilla.suse.com/show_bug.cgi?id=1232885
* https://bugzilla.suse.com/show_bug.cgi?id=1232887
* https://bugzilla.suse.com/show_bug.cgi?id=1232888
* https://bugzilla.suse.com/show_bug.cgi?id=1232890
* https://bugzilla.suse.com/show_bug.cgi?id=1232892
* https://bugzilla.suse.com/show_bug.cgi?id=1232894
* https://bugzilla.suse.com/show_bug.cgi?id=1232896
* https://bugzilla.suse.com/show_bug.cgi?id=1232897
* https://bugzilla.suse.com/show_bug.cgi?id=1232905
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232914
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232925
* https://bugzilla.suse.com/show_bug.cgi?id=1232926
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1232935
* https://bugzilla.suse.com/show_bug.cgi?id=1233029
* https://bugzilla.suse.com/show_bug.cgi?id=1233032
* https://bugzilla.suse.com/show_bug.cgi?id=1233035
* https://bugzilla.suse.com/show_bug.cgi?id=1233036
* https://bugzilla.suse.com/show_bug.cgi?id=1233041
* https://bugzilla.suse.com/show_bug.cgi?id=1233044
* https://bugzilla.suse.com/show_bug.cgi?id=1233049
* https://bugzilla.suse.com/show_bug.cgi?id=1233050
* https://bugzilla.suse.com/show_bug.cgi?id=1233051
* https://bugzilla.suse.com/show_bug.cgi?id=1233056
* https://bugzilla.suse.com/show_bug.cgi?id=1233057
* https://bugzilla.suse.com/show_bug.cgi?id=1233061
* https://bugzilla.suse.com/show_bug.cgi?id=1233062
* https://bugzilla.suse.com/show_bug.cgi?id=1233063
* https://bugzilla.suse.com/show_bug.cgi?id=1233065
* https://bugzilla.suse.com/show_bug.cgi?id=1233067
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233073
* https://bugzilla.suse.com/show_bug.cgi?id=1233074
* https://bugzilla.suse.com/show_bug.cgi?id=1233088
* https://bugzilla.suse.com/show_bug.cgi?id=1233091
* https://bugzilla.suse.com/show_bug.cgi?id=1233092
* https://bugzilla.suse.com/show_bug.cgi?id=1233097
* https://bugzilla.suse.com/show_bug.cgi?id=1233100
* https://bugzilla.suse.com/show_bug.cgi?id=1233103
* https://bugzilla.suse.com/show_bug.cgi?id=1233104
* https://bugzilla.suse.com/show_bug.cgi?id=1233105
* https://bugzilla.suse.com/show_bug.cgi?id=1233106
* https://bugzilla.suse.com/show_bug.cgi?id=1233107
* https://bugzilla.suse.com/show_bug.cgi?id=1233108
* https://bugzilla.suse.com/show_bug.cgi?id=1233110
* https://bugzilla.suse.com/show_bug.cgi?id=1233111
* https://bugzilla.suse.com/show_bug.cgi?id=1233113
* https://bugzilla.suse.com/show_bug.cgi?id=1233114
* https://bugzilla.suse.com/show_bug.cgi?id=1233115
* https://bugzilla.suse.com/show_bug.cgi?id=1233117
* https://bugzilla.suse.com/show_bug.cgi?id=1233119
* https://bugzilla.suse.com/show_bug.cgi?id=1233123
* https://bugzilla.suse.com/show_bug.cgi?id=1233125
* https://bugzilla.suse.com/show_bug.cgi?id=1233127
* https://bugzilla.suse.com/show_bug.cgi?id=1233129
* https://bugzilla.suse.com/show_bug.cgi?id=1233130
* https://bugzilla.suse.com/show_bug.cgi?id=1233132
* https://bugzilla.suse.com/show_bug.cgi?id=1233135
* https://bugzilla.suse.com/show_bug.cgi?id=1233176
* https://bugzilla.suse.com/show_bug.cgi?id=1233179
* https://bugzilla.suse.com/show_bug.cgi?id=1233185
* https://bugzilla.suse.com/show_bug.cgi?id=1233188
* https://bugzilla.suse.com/show_bug.cgi?id=1233189
* https://bugzilla.suse.com/show_bug.cgi?id=1233191
* https://bugzilla.suse.com/show_bug.cgi?id=1233193
* https://bugzilla.suse.com/show_bug.cgi?id=1233197
* https://bugzilla.suse.com/show_bug.cgi?id=1233201
* https://bugzilla.suse.com/show_bug.cgi?id=1233203
* https://bugzilla.suse.com/show_bug.cgi?id=1233204
* https://bugzilla.suse.com/show_bug.cgi?id=1233205
* https://bugzilla.suse.com/show_bug.cgi?id=1233206
* https://bugzilla.suse.com/show_bug.cgi?id=1233207
* https://bugzilla.suse.com/show_bug.cgi?id=1233208
* https://bugzilla.suse.com/show_bug.cgi?id=1233209
* https://bugzilla.suse.com/show_bug.cgi?id=1233210
* https://bugzilla.suse.com/show_bug.cgi?id=1233211
* https://bugzilla.suse.com/show_bug.cgi?id=1233212
* https://bugzilla.suse.com/show_bug.cgi?id=1233216
* https://bugzilla.suse.com/show_bug.cgi?id=1233217
* https://bugzilla.suse.com/show_bug.cgi?id=1233219
* https://bugzilla.suse.com/show_bug.cgi?id=1233226
* https://bugzilla.suse.com/show_bug.cgi?id=1233238
* https://bugzilla.suse.com/show_bug.cgi?id=1233241
* https://bugzilla.suse.com/show_bug.cgi?id=1233244
* https://bugzilla.suse.com/show_bug.cgi?id=1233253
* https://bugzilla.suse.com/show_bug.cgi?id=1233255
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233298
* https://bugzilla.suse.com/show_bug.cgi?id=1233305
* https://bugzilla.suse.com/show_bug.cgi?id=1233320
* https://bugzilla.suse.com/show_bug.cgi?id=1233350
* https://bugzilla.suse.com/show_bug.cgi?id=1233443
* https://bugzilla.suse.com/show_bug.cgi?id=1233452
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233454
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233457
* https://bugzilla.suse.com/show_bug.cgi?id=1233458
* https://bugzilla.suse.com/show_bug.cgi?id=1233460
* https://bugzilla.suse.com/show_bug.cgi?id=1233462
* https://bugzilla.suse.com/show_bug.cgi?id=1233463
* https://bugzilla.suse.com/show_bug.cgi?id=1233464
* https://bugzilla.suse.com/show_bug.cgi?id=1233465
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233471
* https://bugzilla.suse.com/show_bug.cgi?id=1233476
* https://bugzilla.suse.com/show_bug.cgi?id=1233478
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233481
* https://bugzilla.suse.com/show_bug.cgi?id=1233484
* https://bugzilla.suse.com/show_bug.cgi?id=1233485
* https://bugzilla.suse.com/show_bug.cgi?id=1233487
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233523
* https://bugzilla.suse.com/show_bug.cgi?id=1233524
* https://bugzilla.suse.com/show_bug.cgi?id=1233540
* https://bugzilla.suse.com/show_bug.cgi?id=1233547
* https://bugzilla.suse.com/show_bug.cgi?id=1233548
* https://bugzilla.suse.com/show_bug.cgi?id=1233550
* https://bugzilla.suse.com/show_bug.cgi?id=1233552
* https://bugzilla.suse.com/show_bug.cgi?id=1233553
* https://bugzilla.suse.com/show_bug.cgi?id=1233554
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233560
* https://bugzilla.suse.com/show_bug.cgi?id=1233561
* https://bugzilla.suse.com/show_bug.cgi?id=1233564
* https://bugzilla.suse.com/show_bug.cgi?id=1233566
* https://bugzilla.suse.com/show_bug.cgi?id=1233567
* https://bugzilla.suse.com/show_bug.cgi?id=1233568
* https://bugzilla.suse.com/show_bug.cgi?id=1233570
* https://bugzilla.suse.com/show_bug.cgi?id=1233572
* https://bugzilla.suse.com/show_bug.cgi?id=1233573
* https://bugzilla.suse.com/show_bug.cgi?id=1233577
* https://bugzilla.suse.com/show_bug.cgi?id=1233580
* https://bugzilla.suse.com/show_bug.cgi?id=1233640
* https://bugzilla.suse.com/show_bug.cgi?id=1233641
* https://bugzilla.suse.com/show_bug.cgi?id=1233642
* https://bugzilla.suse.com/show_bug.cgi?id=1233721
* https://bugzilla.suse.com/show_bug.cgi?id=1233754
* https://bugzilla.suse.com/show_bug.cgi?id=1233756
* https://bugzilla.suse.com/show_bug.cgi?id=1233769
* https://bugzilla.suse.com/show_bug.cgi?id=1233771
* https://bugzilla.suse.com/show_bug.cgi?id=1233977
* https://bugzilla.suse.com/show_bug.cgi?id=1234009
* https://bugzilla.suse.com/show_bug.cgi?id=1234011
* https://bugzilla.suse.com/show_bug.cgi?id=1234012
* https://bugzilla.suse.com/show_bug.cgi?id=1234025
* https://bugzilla.suse.com/show_bug.cgi?id=1234039
* https://bugzilla.suse.com/show_bug.cgi?id=1234040
* https://bugzilla.suse.com/show_bug.cgi?id=1234041
* https://bugzilla.suse.com/show_bug.cgi?id=1234042
* https://bugzilla.suse.com/show_bug.cgi?id=1234043
* https://bugzilla.suse.com/show_bug.cgi?id=1234044
* https://bugzilla.suse.com/show_bug.cgi?id=1234045
* https://bugzilla.suse.com/show_bug.cgi?id=1234046
* https://bugzilla.suse.com/show_bug.cgi?id=1234072
* https://bugzilla.suse.com/show_bug.cgi?id=1234078
* https://bugzilla.suse.com/show_bug.cgi?id=1234081
* https://bugzilla.suse.com/show_bug.cgi?id=1234083
* https://bugzilla.suse.com/show_bug.cgi?id=1234085
* https://bugzilla.suse.com/show_bug.cgi?id=1234087
* https://bugzilla.suse.com/show_bug.cgi?id=1234093
* https://bugzilla.suse.com/show_bug.cgi?id=1234098
* https://bugzilla.suse.com/show_bug.cgi?id=1234108
* https://bugzilla.suse.com/show_bug.cgi?id=1234121
* https://bugzilla.suse.com/show_bug.cgi?id=1234223
* https://jira.suse.com/browse/PED-11316
* https://jira.suse.com/browse/PED-11442
* https://jira.suse.com/browse/PED-11580
* https://jira.suse.com/browse/PED-9943
1
0
13 Dec '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:4315-1
Release Date: 2024-12-13T15:23:51Z
Rating: important
References:
* bsc#1082555
* bsc#1194869
* bsc#1218644
* bsc#1220382
* bsc#1221309
* bsc#1221333
* bsc#1222364
* bsc#1222590
* bsc#1223202
* bsc#1223656
* bsc#1223848
* bsc#1223919
* bsc#1223942
* bsc#1224518
* bsc#1224526
* bsc#1224574
* bsc#1225725
* bsc#1225730
* bsc#1225742
* bsc#1225764
* bsc#1225812
* bsc#1226560
* bsc#1226592
* bsc#1226631
* bsc#1226748
* bsc#1226872
* bsc#1227853
* bsc#1228410
* bsc#1228430
* bsc#1228486
* bsc#1228650
* bsc#1228857
* bsc#1229312
* bsc#1229429
* bsc#1229585
* bsc#1229752
* bsc#1229808
* bsc#1230055
* bsc#1230220
* bsc#1230231
* bsc#1230270
* bsc#1230558
* bsc#1230827
* bsc#1230918
* bsc#1231083
* bsc#1231089
* bsc#1231098
* bsc#1231101
* bsc#1231108
* bsc#1231111
* bsc#1231132
* bsc#1231135
* bsc#1231138
* bsc#1231169
* bsc#1231178
* bsc#1231180
* bsc#1231181
* bsc#1231187
* bsc#1231202
* bsc#1231434
* bsc#1231441
* bsc#1231452
* bsc#1231465
* bsc#1231474
* bsc#1231481
* bsc#1231537
* bsc#1231541
* bsc#1231646
* bsc#1231849
* bsc#1231856
* bsc#1231858
* bsc#1231859
* bsc#1231864
* bsc#1231904
* bsc#1231916
* bsc#1231920
* bsc#1231923
* bsc#1231930
* bsc#1231931
* bsc#1231947
* bsc#1231952
* bsc#1231953
* bsc#1231959
* bsc#1231978
* bsc#1232013
* bsc#1232015
* bsc#1232016
* bsc#1232017
* bsc#1232027
* bsc#1232028
* bsc#1232047
* bsc#1232048
* bsc#1232050
* bsc#1232056
* bsc#1232076
* bsc#1232080
* bsc#1232094
* bsc#1232096
* bsc#1232098
* bsc#1232111
* bsc#1232126
* bsc#1232134
* bsc#1232135
* bsc#1232141
* bsc#1232142
* bsc#1232147
* bsc#1232152
* bsc#1232159
* bsc#1232162
* bsc#1232165
* bsc#1232180
* bsc#1232185
* bsc#1232187
* bsc#1232189
* bsc#1232195
* bsc#1232198
* bsc#1232201
* bsc#1232218
* bsc#1232224
* bsc#1232232
* bsc#1232254
* bsc#1232255
* bsc#1232264
* bsc#1232272
* bsc#1232279
* bsc#1232287
* bsc#1232293
* bsc#1232312
* bsc#1232317
* bsc#1232318
* bsc#1232333
* bsc#1232334
* bsc#1232335
* bsc#1232339
* bsc#1232349
* bsc#1232357
* bsc#1232359
* bsc#1232362
* bsc#1232364
* bsc#1232370
* bsc#1232371
* bsc#1232378
* bsc#1232385
* bsc#1232387
* bsc#1232394
* bsc#1232413
* bsc#1232416
* bsc#1232436
* bsc#1232483
* bsc#1232500
* bsc#1232503
* bsc#1232504
* bsc#1232507
* bsc#1232520
* bsc#1232552
* bsc#1232757
* bsc#1232819
* bsc#1232860
* bsc#1232870
* bsc#1232873
* bsc#1232877
* bsc#1232878
* bsc#1232881
* bsc#1232884
* bsc#1232885
* bsc#1232887
* bsc#1232888
* bsc#1232890
* bsc#1232892
* bsc#1232896
* bsc#1232897
* bsc#1232905
* bsc#1232907
* bsc#1232919
* bsc#1232926
* bsc#1232928
* bsc#1232935
* bsc#1233035
* bsc#1233049
* bsc#1233051
* bsc#1233056
* bsc#1233057
* bsc#1233061
* bsc#1233063
* bsc#1233065
* bsc#1233067
* bsc#1233070
* bsc#1233073
* bsc#1233074
* bsc#1233100
* bsc#1233103
* bsc#1233104
* bsc#1233105
* bsc#1233106
* bsc#1233107
* bsc#1233108
* bsc#1233110
* bsc#1233111
* bsc#1233113
* bsc#1233114
* bsc#1233117
* bsc#1233123
* bsc#1233125
* bsc#1233129
* bsc#1233130
* bsc#1233134
* bsc#1233135
* bsc#1233150
* bsc#1233189
* bsc#1233191
* bsc#1233197
* bsc#1233205
* bsc#1233206
* bsc#1233209
* bsc#1233210
* bsc#1233211
* bsc#1233212
* bsc#1233214
* bsc#1233216
* bsc#1233238
* bsc#1233241
* bsc#1233253
* bsc#1233255
* bsc#1233293
* bsc#1233350
* bsc#1233452
* bsc#1233453
* bsc#1233454
* bsc#1233456
* bsc#1233457
* bsc#1233458
* bsc#1233460
* bsc#1233462
* bsc#1233463
* bsc#1233468
* bsc#1233471
* bsc#1233476
* bsc#1233478
* bsc#1233479
* bsc#1233481
* bsc#1233484
* bsc#1233487
* bsc#1233490
* bsc#1233491
* bsc#1233528
* bsc#1233548
* bsc#1233552
* bsc#1233553
* bsc#1233554
* bsc#1233555
* bsc#1233557
* bsc#1233560
* bsc#1233561
* bsc#1233570
* bsc#1233577
* bsc#1233580
* bsc#1233977
* bsc#1234012
* bsc#1234025
* bsc#1234085
* bsc#1234093
* bsc#1234098
* bsc#1234108
Cross-References:
* CVE-2021-47594
* CVE-2022-48674
* CVE-2022-48979
* CVE-2022-48982
* CVE-2022-48983
* CVE-2022-48989
* CVE-2022-48990
* CVE-2023-52915
* CVE-2023-52917
* CVE-2023-52918
* CVE-2023-52921
* CVE-2023-52922
* CVE-2024-26782
* CVE-2024-26906
* CVE-2024-26953
* CVE-2024-35888
* CVE-2024-35937
* CVE-2024-35980
* CVE-2024-36484
* CVE-2024-36883
* CVE-2024-36886
* CVE-2024-36905
* CVE-2024-36953
* CVE-2024-36954
* CVE-2024-38577
* CVE-2024-38589
* CVE-2024-38615
* CVE-2024-40997
* CVE-2024-41016
* CVE-2024-41023
* CVE-2024-41049
* CVE-2024-42131
* CVE-2024-43817
* CVE-2024-43897
* CVE-2024-44932
* CVE-2024-44964
* CVE-2024-44995
* CVE-2024-46681
* CVE-2024-46800
* CVE-2024-46802
* CVE-2024-46804
* CVE-2024-46805
* CVE-2024-46807
* CVE-2024-46810
* CVE-2024-46812
* CVE-2024-46819
* CVE-2024-46821
* CVE-2024-46835
* CVE-2024-46842
* CVE-2024-46853
* CVE-2024-46859
* CVE-2024-46864
* CVE-2024-46871
* CVE-2024-47663
* CVE-2024-47665
* CVE-2024-47667
* CVE-2024-47669
* CVE-2024-47670
* CVE-2024-47671
* CVE-2024-47679
* CVE-2024-47682
* CVE-2024-47693
* CVE-2024-47695
* CVE-2024-47696
* CVE-2024-47697
* CVE-2024-47698
* CVE-2024-47699
* CVE-2024-47701
* CVE-2024-47709
* CVE-2024-47712
* CVE-2024-47713
* CVE-2024-47718
* CVE-2024-47723
* CVE-2024-47728
* CVE-2024-47735
* CVE-2024-47737
* CVE-2024-47742
* CVE-2024-47745
* CVE-2024-47749
* CVE-2024-47756
* CVE-2024-47757
* CVE-2024-49850
* CVE-2024-49851
* CVE-2024-49852
* CVE-2024-49855
* CVE-2024-49861
* CVE-2024-49863
* CVE-2024-49868
* CVE-2024-49870
* CVE-2024-49871
* CVE-2024-49875
* CVE-2024-49877
* CVE-2024-49879
* CVE-2024-49884
* CVE-2024-49891
* CVE-2024-49900
* CVE-2024-49902
* CVE-2024-49903
* CVE-2024-49905
* CVE-2024-49907
* CVE-2024-49908
* CVE-2024-49921
* CVE-2024-49924
* CVE-2024-49925
* CVE-2024-49934
* CVE-2024-49935
* CVE-2024-49938
* CVE-2024-49945
* CVE-2024-49947
* CVE-2024-49950
* CVE-2024-49957
* CVE-2024-49963
* CVE-2024-49965
* CVE-2024-49966
* CVE-2024-49968
* CVE-2024-49981
* CVE-2024-49983
* CVE-2024-49985
* CVE-2024-49989
* CVE-2024-50003
* CVE-2024-50007
* CVE-2024-50008
* CVE-2024-50009
* CVE-2024-50013
* CVE-2024-50017
* CVE-2024-50025
* CVE-2024-50026
* CVE-2024-50031
* CVE-2024-50044
* CVE-2024-50062
* CVE-2024-50067
* CVE-2024-50073
* CVE-2024-50074
* CVE-2024-50077
* CVE-2024-50078
* CVE-2024-50082
* CVE-2024-50089
* CVE-2024-50093
* CVE-2024-50095
* CVE-2024-50096
* CVE-2024-50098
* CVE-2024-50099
* CVE-2024-50103
* CVE-2024-50108
* CVE-2024-50110
* CVE-2024-50115
* CVE-2024-50116
* CVE-2024-50117
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50128
* CVE-2024-50131
* CVE-2024-50134
* CVE-2024-50135
* CVE-2024-50138
* CVE-2024-50141
* CVE-2024-50146
* CVE-2024-50147
* CVE-2024-50148
* CVE-2024-50150
* CVE-2024-50153
* CVE-2024-50154
* CVE-2024-50155
* CVE-2024-50156
* CVE-2024-50160
* CVE-2024-50167
* CVE-2024-50171
* CVE-2024-50179
* CVE-2024-50180
* CVE-2024-50182
* CVE-2024-50183
* CVE-2024-50184
* CVE-2024-50186
* CVE-2024-50187
* CVE-2024-50188
* CVE-2024-50189
* CVE-2024-50192
* CVE-2024-50194
* CVE-2024-50195
* CVE-2024-50196
* CVE-2024-50198
* CVE-2024-50201
* CVE-2024-50205
* CVE-2024-50208
* CVE-2024-50209
* CVE-2024-50215
* CVE-2024-50218
* CVE-2024-50229
* CVE-2024-50230
* CVE-2024-50232
* CVE-2024-50233
* CVE-2024-50234
* CVE-2024-50236
* CVE-2024-50237
* CVE-2024-50249
* CVE-2024-50255
* CVE-2024-50259
* CVE-2024-50261
* CVE-2024-50264
* CVE-2024-50265
* CVE-2024-50267
* CVE-2024-50268
* CVE-2024-50269
* CVE-2024-50271
* CVE-2024-50273
* CVE-2024-50274
* CVE-2024-50279
* CVE-2024-50282
* CVE-2024-50287
* CVE-2024-50289
* CVE-2024-50290
* CVE-2024-50292
* CVE-2024-50295
* CVE-2024-50298
* CVE-2024-50301
* CVE-2024-50302
* CVE-2024-53052
* CVE-2024-53058
* CVE-2024-53059
* CVE-2024-53060
* CVE-2024-53061
* CVE-2024-53063
* CVE-2024-53066
* CVE-2024-53068
* CVE-2024-53079
* CVE-2024-53085
* CVE-2024-53088
* CVE-2024-53104
* CVE-2024-53110
CVSS scores:
* CVE-2021-47594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47594 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48674 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48979 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48979 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48982 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48983 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48989 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48989 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48990 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48990 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48990 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52917 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-52917 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26906 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35937 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36905 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36953 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36954 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38577 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38577 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38615 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41023 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-41023 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-41049 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41049 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42131 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43817 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44932 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44964 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H
* CVE-2024-44964 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44964 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
* CVE-2024-46681 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46802 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46804 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46804 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-46804 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46805 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46807 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46810 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46812 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46812 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46812 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46819 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46853 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46871 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46871 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-46871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47663 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47663 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47665 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47665 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47667 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-47667 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47669 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47669 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-47669 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47671 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-47671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-47679 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47679 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47682 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47682 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47682 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47693 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47693 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-47693 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47695 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47695 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47696 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47696 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47697 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47697 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47698 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47698 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47698 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47699 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47709 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47723 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47723 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47737 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47737 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-47737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47742 ( SUSE ): 8.3
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47742 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-47742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47745 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47745 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47749 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47757 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47757 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-47757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49850 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49855 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49855 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49861 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49861 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-49863 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49868 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49870 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-49870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49875 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49875 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-49875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49877 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49877 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49879 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49891 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49900 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49900 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-49900 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49902 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49902 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49903 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49903 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49903 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49905 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49921 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49924 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49934 ( SUSE ): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49934 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49935 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49938 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49945 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49966 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49968 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49968 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-49968 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49981 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49989 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49989 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49989 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50003 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50007 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50007 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50007 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50008 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50008 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50025 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50026 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50044 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50073 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50082 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50089 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50089 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-50089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50117 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50117 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50128 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50128 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50128 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50134 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50134 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50135 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50135 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50135 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50138 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50148 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50148 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50150 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50150 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50150 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50153 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50154 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50155 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50167 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50171 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50171 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50179 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50180 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50182 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50182 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50183 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50183 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50183 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50184 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50186 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50192 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50205 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50208 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50208 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50229 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50230 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50232 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50232 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50233 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50233 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50234 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50236 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-50236 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50249 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50259 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50259 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50261 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50261 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50261 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50264 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50265 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50267 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50268 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50268 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50271 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50274 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50282 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-50282 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53052 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53052 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53061 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53061 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53068 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53079 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53088 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53088 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53110 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Real Time Module 15-SP5
An update that solves 230 vulnerabilities and has 33 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2021-47594: mptcp: never allow the PM to close a listener subflow
(bsc#1226560).
* CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb()
(bsc#1231959).
* CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
* CVE-2024-26906: Fixed invalid vsyscall page read for
copy_from_kernel_nofault() (bsc#1223202).
* CVE-2024-26953: net: esp: fix bad handling of pages from page_pool
(bsc#1223656).
* CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb->head
(bsc#1224518).
* CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully
(bsc#1224526).
* CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
* CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
* CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
(bsc#1225742).
* CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append
(bsc#1225764).
* CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).
* CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592).
* CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit
(bsc#1227853).
* CVE-2024-41023: sched/deadline: Fix task_struct reference leak
(bsc#1228430).
* CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
* CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft
reset (bsc#1230220).
* CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during
resetting (bsc#1230231).
* CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
* CVE-2024-46800: sch/netem: fix use after free in netem_dequeue
(bsc#1230827).
* CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&iput()
(bsc#1231930).
* CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath
the filesystem (bsc#1231920).
* CVE-2024-47745: mm: call the security_mmap_file() LSM hook in
remap_file_pages() (bsc#1232135).
* CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete()
(bsc#1232187).
* CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a
new trasacntion (bsc#1232272).
* CVE-2024-49921: drm/amd/display: Check null pointers before used
(bsc#1232371).
* CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core
(bsc#1232224)
* CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid
dentry.d_name.name (bsc#1232387).
* CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the
associated structure (bsc#1232165).
* CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
* CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted
with siphash (bsc#1232264).
* CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid
double-free (bsc#1232096).
* CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module
unload (bsc#1232483).
* CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return
value (bsc#1232318).
* CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
(bsc#1232520).
* CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs.
rq_qos_wake_function race (bsc#1232500).
* CVE-2024-50089: unicode: Do not special case ignorable code points
(bsc#1232860).
* CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during
module unload (bsc#1232877).
* CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down
(bsc#1232881).
* CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too
(bsc#1232884).
* CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping
(bsc#1232885).
* CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
(bsc#1232919).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232907).
* CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
* CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of
vbva_mouse_pointer_shape (bsc#1232890).
* CVE-2024-50135: nvme-pci: fix race condition between reset and
nvme_dev_disable() (bsc#1232888).
* CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
* CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure
(bsc#1233056).
* CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067).
* CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in
target_alloc_device() (bsc#1233061).
* CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink()
(bsc#1233070).
* CVE-2024-50167: be2net: fix potential memory leak in be_xmit()
(bsc#1233049).
* CVE-2024-50171: net: systemport: fix potential memory leak in
bcm_sysport_xmit() (bsc#1233057).
* CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct
map (bsc#1233129).
* CVE-2024-50184: virtio_pmem: Check device status before requesting flush
(bsc#1233135).
* CVE-2024-50186: net: explicitly clear the sk pointer, when pf->create fails
(bsc#1233110).
* CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber
(bsc#1233107).
* CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE
(bsc#1233106).
* CVE-2024-50195: posix-clock: Fix missing timespec64 check in
pc_clock_settime() (bsc#1233103).
* CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts
(bsc#1233113).
* CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in
apply_constraint_to_size() (bsc#1233293).
* CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
(bsc#1233117).
* CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks
(bsc#1233205).
* CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked
flag (bsc#1233206).
* CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in
nsim_nexthop_bucket_activity_write() (bsc#1233214).
* CVE-2024-50261: macsec: Fix use-after-free while sending the offloading
packet (bsc#1233253).
* CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer
occurring in vsk->trans (bsc#1233453).
* CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk
(bsc#1233456).
* CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
* CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from
the list (bsc#1233462).
* CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings
(bsc#1233463).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233468).
* CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
* CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single
(bsc#1233484).
* CVE-2024-50298: net: enetc: allocate vf_state during PF probes
(bsc#1233487).
* CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start
write (bsc#1233548).
* CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged
SKB data (bsc#1233552).
* CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
* CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access
(bsc#1233557).
* CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in
scmi_bus_notifier() (bsc#1233561).
* CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking
(bsc#1233570).
* CVE-2024-53088: i40e: fix race condition by adding filter's intermediate
sync state (bsc#1233580).
* CVE-2024-53104: media: uvcvideo: Skip parsing frames of type
UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
* CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error
(bsc#1234085).
The following non-security bugs were fixed:
* Drop OCFS2 patch causing a regression (bsc#1233255)
* Fix regression on AMDGPU driver (bsc#1233134)
* Removed the duplicated check of static_assert(sizeof(struct work_struct) >=
sizeof(struct rcu_head)).
* Removed unnecessary white-space change in kernel/bpf/syscall.c
* Revert "cgroup: Fix memory leak caused by missing cgroup_bpf_offline"
(bsc#1234108).
* Revert "ixgbe: Manual AN-37 for troublesome link partners for X550 SFI"
(git-fixes).
* Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" (git-
fixes).
* Revert "usb: gadget: composite: fix OS descriptors w_value logic" (git-
fixes).
* Update config files (bsc#1218644).
* Update config files. Enabled IDPF for ARM64 (bsc#1221309)
* acpi: CPPC: Fix _CPC register setting issue (git-fixes).
* acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).
* acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid
detection issue (stable-fixes).
* acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-
fixes).
* ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
* adapt same struct naming as similar kABI workaround in SLE15-SP6 (prefixed
with "suse_" to make it more obvious its a downstream thing.
* add bugreference to a hv_netvsc patch (bsc#1232413).
* add commit message for the kABI patch
* alsa: 6fire: Release resources at card release (git-fixes).
* alsa: ac97: bus: Fix the mistake in the comment (git-fixes).
* alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
* alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-
fixes).
* alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
* alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-
fixes).
* alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).
* alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-
fixes).
* alsa: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).
* alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).
* alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).
* alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-
fixes).
* alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
* alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes).
* alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).
* alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
* amd-pstate: Set min_perf to nominal_perf for active mode performance gov
(git-fixes).
* arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes)
* arm64: Force position-independent veneers (git-fixes).
* arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
* arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
* arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-
fixes)
* arm64: smccc: replace custom COUNT_ARGS() & CONCATENATE() (git-fixes)
* arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-
fixes)
* arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes)
* asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
* asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata()
(git-fixes).
* asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to
default regs values (stable-fixes).
* asoc: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).
* asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).
* asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-
fixes).
* asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-
fixes).
* blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528).
* block: Avoid leaking hctx->nr_active counter on batched completion
(bsc#1231923).
* bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-
fixes).
* bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).
* bnxt_en: Fix the PCI-AER routines (git-fixes).
* bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes).
* bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down
(git-fixes).
* bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).
* bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).
* bnxt_en: Wait for FLR to complete during probe (git-fixes).
* bnxt_en: refactor reset close code (git-fixes).
* can: c_can: c_can_handle_bus_err(): update statistics if skb allocation
fails (git-fixes).
* can: c_can: fix {rx,tx}_errors statistics (git-fixes).
* can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
* can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics
(git-fixes).
* can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
* can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-
fixes).
* can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL
(git-fixes).
* can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
* cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
* chtls: fix tp->rcv_tstamp initialization (git-fixes).
* comedi: Flush partial mappings in error case (git-fixes).
* crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
* crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
* crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
* crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-
fixes).
* crypto: cavium - Fix the if condition to exit loop after timeout (git-
fixes).
* crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
(git-fixes).
* crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
* cxgb4: Properly lock TX queue for the selftest (git-fixes).
* cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).
* cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-
fixes).
* drivers: net: prevent tun_build_skb() to exceed the packet size limit (git-
fixes).
* drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
* drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-
fixes).
* drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-
fixes).
* drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-
fixes).
* drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
* drm/bridge: tc358767: Fix link properties discovery (git-fixes).
* drm/bridge: tc358768: Fix DSI command tx (git-fixes).
* drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-
fixes).
* drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-
fixes).
* drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk()
(git-fixes).
* drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
* drm/omap: Fix possible NULL dereference (git-fixes).
* drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
* drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
* drm/sti: avoid potential dereference of error pointers (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_gdp_atomic_check (git-fixes).
* drm/sti: avoid potential dereference of error pointers in
sti_hqvdp_atomic_check (git-fixes).
* drm/v3d: Address race-condition in MMU flush (git-fixes).
* drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real
VLA (stable-fixes).
* drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
* drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-
fixes).
* drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-
fixes).
* drm/vmwgfx: Limit display layout ioctl array size to
VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
* e1000e: Fix S0ix residency on corporate systems (git-fixes).
* efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
* eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-
fixes).
* firmware: google: Unregister driver_info on failure (git-fixes).
* genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).
* goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
* gve: Fix XDP TX completion handling when counters overflow (git-fixes).
* gve: Fix an edge case for TSO skb validity check (git-fixes).
* gve: Fix skb truesize underestimation (git-fixes).
* gve: ignore nonrelevant GSO type bits when processing TSO headers (git-
fixes).
* hid: core: zero-initialize the report buffer (git-fixes).
* hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-
fixes).
* hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-
fixes).
* hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
(stable-fixes).
* hid: multitouch: Add support for B2402FVA track point (stable-fixes).
* hid: wacom: Defer calculation of resolution until resolution_code is known
(git-fixes).
* hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-
fixes).
* hid: wacom: fix when get product name maybe null pointer (git-fixes).
* hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (git-
fixes).
* hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
* i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-
fixes).
* i40e: Fix XDP program unloading while removing the driver (git-fixes).
* i40e: Fix filter input checks to prevent config with invalid values (git-
fixes).
* i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes).
* i40e: Report MFS in decimal base instead of hex (git-fixes).
* i40e: Restore VF MSI-X state during PCI reset (git-fixes).
* i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes).
* i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-
fixes).
* i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes).
* i40e: take into account XDP Tx queues when stopping rings (git-fixes).
* iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
* iavf: Fix TC config comparison with existing adapter TC config (git-fixes).
* iavf: Fix promiscuous mode configuration flow messages (git-fixes).
* iavf: Introduce new state machines for flow director (git-fixes).
* iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git-
fixes).
* iavf: fix FDIR rule fields masks validation (git-fixes).
* iavf: in iavf_down, disable queues when removing the driver (git-fixes).
* iavf: initialize waitqueues before starting watchdog_task (git-fixes).
* iavf: send VLAN offloading caps once after VFR (git-fixes).
* iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git-
fixes).
* ibmvnic: Do partial reset on login failure (bsc#1233150).
* ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150).
* ibmvnic: Ensure login failure recovery is safe from other resets
(bsc#1233150).
* ibmvnic: Handle DMA unmapping of login buffs in release functions
(bsc#1233150).
* ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150).
* ice: Block switchdev mode when ADQ is active and vice versa (git-fixes).
* ice: Fix NULL pointer deref during VF reset (git-fixes).
* ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).
* ice: Fix link_down_on_close message (git-fixes).
* ice: Fix netif_is_ice() in Safe Mode (git-fixes).
* ice: Interpret .set_channels() input differently (git-fixes).
* ice: Shut down VSI with "link-down-on-close" enabled (git-fixes).
* ice: avoid executing commands on other ports when driving sync (git-fixes).
* ice: change q_index variable type to s16 to store -1 value (git-fixes).
* ice: fix ICE_LAST_OFFSET formula (git-fixes).
* ice: fix VLAN replay after reset (git-fixes).
* ice: fix accounting for filters shared by multiple VSIs (git-fixes).
* ice: fix accounting if a VLAN already exists (git-fixes).
* ice: fix over-shifted variable (git-fixes).
* ice: fix receive buffer size miscalculation (git-fixes).
* ice: ice_aq_check_events: fix off-by-one check when filling buffer (git-
fixes).
* ice: reset first in crash dump kernels (git-fixes).
* ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).
* ice: tc: allow zero flags in parsing tc flower (git-fixes).
* ice: virtchnl: stop pretending to support RSS over AQ or registers (git-
fixes).
* idpf: Interpret .set_channels() input differently (git-fixes).
* idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git-
fixes).
* idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes).
* idpf: disable local BH when scheduling napi for marker packets (git-fixes).
* idpf: distinguish vports by the dev_port attribute (git-fixes).
* idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-
fixes).
* idpf: fix UAFs when destroying the queues (git-fixes).
* idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes).
* idpf: fix memleak in vport interrupt configuration (git-fixes).
* idpf: fix memory leaks and crashes while performing a soft reset (git-
fixes).
* igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).
* igb: Fix missing time sync events (git-fixes).
* igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).
* igb: extend PTP timestamp adjustments to i211 (git-fixes).
* igc: Check VLAN EtherType mask (git-fixes).
* igc: Check VLAN TCI mask (git-fixes).
* igc: Fix hicredit calculation (git-fixes).
* igc: Fix missing time sync events (git-fixes).
* igc: Remove temporary workaround (git-fixes).
* igc: Report VLAN EtherType matching back to user (git-fixes).
* igc: Unlock on error in igc_io_resume() (git-fixes).
* iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-
fixes).
* iio: adc: ad7606: Fix typo in the driver name (git-fixes).
* iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
* iio: light: al3010: Fix an error handling path in al3010_probe() (git-
fixes).
* iio: light: veml6030: fix microlux value calculation (git-fixes).
* initramfs: avoid filename buffer overrun (bsc#1232436).
* input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes).
* input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes).
* input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table
(git-fixes).
* input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git-
fixes).
* input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line
(git-fixes).
* irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
* irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-
fixes).
* ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).
* ixgbe: fix crash with empty VF macvlan list (git-fixes).
* ixgbe: fix timestamp configuration code (git-fixes).
* ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).
* kABI: Restore exported __arm_smccc_sve_check (git-fixes)
* kernel-binary: Enable livepatch package only when livepatch is enabled
Otherwise the filelist may be empty failing the build (bsc#1218644).
* kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes)
* kexec: fix a memory leak in crash_shrink_memory() (git-fixes).
* kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).
* mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).
* media: adv7604: prevent underflow condition when reporting colorspace (git-
fixes).
* media: cx24116: prevent overflows on SNR calculus (git-fixes).
* media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer
(stable-fixes).
* media: dvb-usb-v2: af9035: fix missing unlock (git-fixes).
* media: dvb_frontend: do not play tricks with underflow values (git-fixes).
* media: dvbdev: prevent the risk of out of memory access (git-fixes).
* media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).
* media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
* media: stb0899_algo: initialize cfr before using it (git-fixes).
* media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
* media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
* mei: use kvmalloc for read buffer (git-fixes).
* misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
* mm/hugetlb: fix nodes huge page allocation when there are surplus pages
(bsc#1234012).
* mm/memory: add non-anonymous page check in the copy_present_page()
(bsc#1231646).
* modpost: remove incorrect code in do_eisa_entry() (git-fixes).
* net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-
fixes).
* net/mlx5: Added cond_resched() to crdump collection (git-fixes).
* net/mlx5: Allow 0 for total host VFs (git-fixes).
* net/mlx5: Correctly compare pkt reformat ids (git-fixes).
* net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes).
* net/mlx5: DR, Use the right GVMI number for drop action (git-fixes).
* net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx (git-fixes).
* net/mlx5: Drain health before unregistering devlink (git-fixes).
* net/mlx5: E-switch, register event handler before arming the event (git-
fixes).
* net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).
* net/mlx5: Fix fw tracer first block check (git-fixes).
* net/mlx5: Handle fw tracer change ownership event based on MTRC (git-fixes).
* net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes).
* net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).
* net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).
* net/mlx5: Lag, restore buckets number to default after hash LAG deactivation
(git-fixes).
* net/mlx5: Skip clock update work when device is in error state (git-fixes).
* net/mlx5: Unregister notifier on eswitch init failure (git-fixes).
* net/mlx5: Update the list of the PCI supported devices (git-fixes).
* net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes).
* net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO
(git-fixes).
* net/mlx5: Use recovery timeout on sync reset flow (git-fixes).
* net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes).
* net/mlx5: fs, lock FTE when checking if active (git-fixes).
* net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys
(git-fixes).
* net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).
* net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-
fixes).
* net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
* net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes).
* net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
* net/mlx5e: Change the warning when ignore_flow_level is not supported (git-
fixes).
* net/mlx5e: Check return value of snprintf writing to fw_version buffer (git-
fixes).
* net/mlx5e: Check return value of snprintf writing to fw_version buffer for
representors (git-fixes).
* net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git-
fixes).
* net/mlx5e: Correct snprintf truncation handling for fw_version buffer used
by representors (git-fixes).
* net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).
* net/mlx5e: Do not offload internal port if filter device is out device (git-
fixes).
* net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).
* net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).
* net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set
(git-fixes).
* net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN)
packets (git-fixes).
* net/mlx5e: Fix pedit endianness (git-fixes).
* net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes).
* net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git-
fixes).
* net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).
* net/mlx5e: Move representor neigh cleanup to profile cleanup_tx (git-fixes).
* net/mlx5e: Reduce the size of icosq_str (git-fixes).
* net/mlx5e: Take state lock during tx timeout reporter (git-fixes).
* net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer
exhaustion (git-fixes).
* net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes).
* net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git-
fixes).
* net/mlx5e: fix double free of encap_header (git-fixes).
* net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git-
fixes).
* net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes).
* net: ena: Fix potential sign extension issue (git-fixes).
* net: ena: Remove ena_select_queue (git-fixes).
* net: ena: Wrong missing IO completions check order (git-fixes).
* net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).
* net: relax socket state check at accept time (git-fixes).
* net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device
(git-fixes).
* net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL
configuration (git-fixes).
* net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
* net: usb: usbnet: fix race in probe failure (git-fixes).
* nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
* nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
* nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
* nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
* ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove() (git-fixes).
* pci: Add T_PVPERL macro (git-fixes).
* pci: Fix reset_method_store() memory leak (git-fixes).
* pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf()
(git-fixes).
* pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds
(git-fixes).
* pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
* pci: keystone: Set mode as Root Complex for "ti,keystone-pcie" compatible
(git-fixes).
* pci: rockchip-ep: Fix address translation unit programming (git-fixes).
* phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).
* platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-
fixes).
* platform/surface: aggregator: Fix warning when controller is destroyed in
probe (git-fixes).
* platform/x86: dell-sysman: add support for alienware products (stable-
fixes).
* platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).
* posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
* power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
* power: supply: core: Remove might_sleep() from power_supply_put() (git-
fixes).
* powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869).
* powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
* powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
* powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
* powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
* powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
(bsc#1194869).
* powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
* powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector
(bsc#1194869).
* powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
* powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869).
* qed: avoid truncating work queue length (git-fixes).
* rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
* rdma/hns: Add clear_hem return value to log (git-fixes)
* rdma/hns: Add mutex_destroy() (git-fixes)
* rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
* rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci
(git-fixes)
* rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)
* rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
* rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
* rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
* rdma/hns: Remove unnecessary QP type checks (git-fixes)
* rdma/hns: Use dev_ _printings in hem code instead of ibdev__ (git-fixes)
* rdma/hns: Use macro instead of magic number (git-fixes)
* rdma/mlx5: Move events notifier registration to be after device registration
(git-fixes)
* rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-
fixes).
* rdma/rxe: Fix the qp flush warnings in req (git-fixes)
* rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
* rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed
by the new klp-convert implementation. (bsc#1218644)
* rtc: ab-eoz9: do not fail temperature reads on undervoltage notification
(git-fixes).
* rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
* rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-
fixes).
* rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241).
* scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths
(bsc#1233241).
* scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask
(bsc#1233241).
* scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up
FDMI (bsc#1233241).
* scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs
(bsc#1233241).
* scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241).
* scsi: lpfc: Modify CGN warning signal calculation based on EDC response
(bsc#1233241).
* scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback
(bsc#1233241).
* scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure
(bsc#1233241).
* scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241).
* scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG
flag (bsc#1233241).
* scsi: scsi_transport_fc: Allow setting rport state to current state (git-
fixes).
* scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
* security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
* serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
* sfc: Check firmware supports Ethernet PTP filter (git-fixes).
* sfc: do not unregister flow_indr if it was never registered (git-fixes).
* sfc: fix a double-free bug in efx_probe_filters (git-fixes).
* signal: Replace BUG_ON()s (bsc#1234093).
* spi: Fix acpi deferred irq probe (git-fixes).
* spi: atmel-quadspi: Fix register name in verbose logging function (git-
fixes).
* staging: iio: frequency: ad9832: fix division by zero in
ad9832_calc_freqreg() (git-fixes).
* thermal: core: Initialize thermal zones before registering them (git-fixes).
* thermal: intel: int340x: processor: Fix warning during module unload (git-
fixes).
* tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
* tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes).
* tun: prevent negative ifindex (git-fixes).
* ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
* usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
* usb: chaoskey: fail open after removal (git-fixes).
* usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing
logic (git-fixes).
* usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
* usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
* usb: ehci-spear: fix call balance of sehci clk handling routines (git-
fixes).
* usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
* usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).
* usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-
fixes).
* usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).
* usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
* usb: serial: option: add Quectel RG650V (stable-fixes).
* usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-
fixes).
* usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
(git-fixes).
* usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes()
(git-fixes).
* usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read()
(git-fixes).
* usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
* usb: yurex: make waiting on yurex_write interruptible (git-fixes).
* usbip: tools: Fix detach_port() invalid port error path (git-fixes).
* vdpa/mlx5: preserve CVQ vringh index (git-fixes).
* watchdog: mediatek: Make sure system reset gets asserted in
mtk_wdt_restart() (git-fixes).
* watchdog: rti: of: honor timeout-sec property (git-fixes).
* wifi: ath10k: Fix memory leak in management tx (git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1
(git-fixes).
* wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2
(git-fixes).
* wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).
* wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
(git-fixes).
* wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).
* wifi: iwlegacy: Clear stale interrupts before resuming device (stable-
fixes).
* wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
(git-fixes).
* wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable-
fixes).
* wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
(git-fixes).
* wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).
* wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan() (git-fixes).
* wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* x86/kvm: fix is_stale_page_fault() (bsc#1221333).
* xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).
* xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes).
* xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Real Time Module 15-SP5
zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-4315=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4315=1 openSUSE-SLE-15.5-2024-4315=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4315=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4315=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4315=1
## Package List:
* SUSE Real Time Module 15-SP5 (x86_64)
* kernel-rt_debug-vdso-5.14.21-150500.13.79.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-debugsource-5.14.21-150500.13.79.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.79.1
* cluster-md-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt_debug-devel-5.14.21-150500.13.79.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.79.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-vdso-5.14.21-150500.13.79.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.79.1
* kernel-syms-rt-5.14.21-150500.13.79.1
* gfs2-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt-devel-5.14.21-150500.13.79.1
* dlm-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.79.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.79.1
* ocfs2-kmp-rt-5.14.21-150500.13.79.1
* SUSE Real Time Module 15-SP5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.79.1
* kernel-source-rt-5.14.21-150500.13.79.1
* SUSE Real Time Module 15-SP5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.79.1
* kernel-rt-5.14.21-150500.13.79.1
* openSUSE Leap 15.5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.79.1
* kernel-source-rt-5.14.21-150500.13.79.1
* openSUSE Leap 15.5 (x86_64)
* kernel-rt-extra-5.14.21-150500.13.79.1
* reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-livepatch-5.14.21-150500.13.79.1
* kernel-rt_debug-vdso-5.14.21-150500.13.79.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-debuginfo-5.14.21-150500.13.79.1
* kselftests-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-livepatch-SLE15-SP5-RT_Update_23-debugsource-1-150500.11.3.1
* kernel-rt-debugsource-5.14.21-150500.13.79.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.79.1
* kernel-rt-optional-5.14.21-150500.13.79.1
* kernel-rt-extra-debuginfo-5.14.21-150500.13.79.1
* reiserfs-kmp-rt-5.14.21-150500.13.79.1
* cluster-md-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt_debug-devel-5.14.21-150500.13.79.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-livepatch-5_14_21-150500_13_79-rt-debuginfo-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_13_79-rt-1-150500.11.3.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.79.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-vdso-5.14.21-150500.13.79.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.79.1
* gfs2-kmp-rt-5.14.21-150500.13.79.1
* kernel-syms-rt-5.14.21-150500.13.79.1
* kselftests-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt-optional-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-devel-5.14.21-150500.13.79.1
* dlm-kmp-rt-5.14.21-150500.13.79.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.79.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.79.1
* kernel-rt-livepatch-devel-5.14.21-150500.13.79.1
* ocfs2-kmp-rt-5.14.21-150500.13.79.1
* openSUSE Leap 15.5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.79.1
* kernel-rt-5.14.21-150500.13.79.1
* openSUSE Leap Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.79.1
* openSUSE Leap Micro 5.5 (x86_64)
* kernel-rt-debugsource-5.14.21-150500.13.79.1
* kernel-rt-debuginfo-5.14.21-150500.13.79.1
* SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.79.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* kernel-rt-debugsource-5.14.21-150500.13.79.1
* kernel-rt-debuginfo-5.14.21-150500.13.79.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-source-rt-5.14.21-150500.13.79.1
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-5_14_21-150500_13_79-rt-debuginfo-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_13_79-rt-1-150500.11.3.1
* kernel-livepatch-SLE15-SP5-RT_Update_23-debugsource-1-150500.11.3.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47594.html
* https://www.suse.com/security/cve/CVE-2022-48674.html
* https://www.suse.com/security/cve/CVE-2022-48979.html
* https://www.suse.com/security/cve/CVE-2022-48982.html
* https://www.suse.com/security/cve/CVE-2022-48983.html
* https://www.suse.com/security/cve/CVE-2022-48989.html
* https://www.suse.com/security/cve/CVE-2022-48990.html
* https://www.suse.com/security/cve/CVE-2023-52915.html
* https://www.suse.com/security/cve/CVE-2023-52917.html
* https://www.suse.com/security/cve/CVE-2023-52918.html
* https://www.suse.com/security/cve/CVE-2023-52921.html
* https://www.suse.com/security/cve/CVE-2023-52922.html
* https://www.suse.com/security/cve/CVE-2024-26782.html
* https://www.suse.com/security/cve/CVE-2024-26906.html
* https://www.suse.com/security/cve/CVE-2024-26953.html
* https://www.suse.com/security/cve/CVE-2024-35888.html
* https://www.suse.com/security/cve/CVE-2024-35937.html
* https://www.suse.com/security/cve/CVE-2024-35980.html
* https://www.suse.com/security/cve/CVE-2024-36484.html
* https://www.suse.com/security/cve/CVE-2024-36883.html
* https://www.suse.com/security/cve/CVE-2024-36886.html
* https://www.suse.com/security/cve/CVE-2024-36905.html
* https://www.suse.com/security/cve/CVE-2024-36953.html
* https://www.suse.com/security/cve/CVE-2024-36954.html
* https://www.suse.com/security/cve/CVE-2024-38577.html
* https://www.suse.com/security/cve/CVE-2024-38589.html
* https://www.suse.com/security/cve/CVE-2024-38615.html
* https://www.suse.com/security/cve/CVE-2024-40997.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41023.html
* https://www.suse.com/security/cve/CVE-2024-41049.html
* https://www.suse.com/security/cve/CVE-2024-42131.html
* https://www.suse.com/security/cve/CVE-2024-43817.html
* https://www.suse.com/security/cve/CVE-2024-43897.html
* https://www.suse.com/security/cve/CVE-2024-44932.html
* https://www.suse.com/security/cve/CVE-2024-44964.html
* https://www.suse.com/security/cve/CVE-2024-44995.html
* https://www.suse.com/security/cve/CVE-2024-46681.html
* https://www.suse.com/security/cve/CVE-2024-46800.html
* https://www.suse.com/security/cve/CVE-2024-46802.html
* https://www.suse.com/security/cve/CVE-2024-46804.html
* https://www.suse.com/security/cve/CVE-2024-46805.html
* https://www.suse.com/security/cve/CVE-2024-46807.html
* https://www.suse.com/security/cve/CVE-2024-46810.html
* https://www.suse.com/security/cve/CVE-2024-46812.html
* https://www.suse.com/security/cve/CVE-2024-46819.html
* https://www.suse.com/security/cve/CVE-2024-46821.html
* https://www.suse.com/security/cve/CVE-2024-46835.html
* https://www.suse.com/security/cve/CVE-2024-46842.html
* https://www.suse.com/security/cve/CVE-2024-46853.html
* https://www.suse.com/security/cve/CVE-2024-46859.html
* https://www.suse.com/security/cve/CVE-2024-46864.html
* https://www.suse.com/security/cve/CVE-2024-46871.html
* https://www.suse.com/security/cve/CVE-2024-47663.html
* https://www.suse.com/security/cve/CVE-2024-47665.html
* https://www.suse.com/security/cve/CVE-2024-47667.html
* https://www.suse.com/security/cve/CVE-2024-47669.html
* https://www.suse.com/security/cve/CVE-2024-47670.html
* https://www.suse.com/security/cve/CVE-2024-47671.html
* https://www.suse.com/security/cve/CVE-2024-47679.html
* https://www.suse.com/security/cve/CVE-2024-47682.html
* https://www.suse.com/security/cve/CVE-2024-47693.html
* https://www.suse.com/security/cve/CVE-2024-47695.html
* https://www.suse.com/security/cve/CVE-2024-47696.html
* https://www.suse.com/security/cve/CVE-2024-47697.html
* https://www.suse.com/security/cve/CVE-2024-47698.html
* https://www.suse.com/security/cve/CVE-2024-47699.html
* https://www.suse.com/security/cve/CVE-2024-47701.html
* https://www.suse.com/security/cve/CVE-2024-47709.html
* https://www.suse.com/security/cve/CVE-2024-47712.html
* https://www.suse.com/security/cve/CVE-2024-47713.html
* https://www.suse.com/security/cve/CVE-2024-47718.html
* https://www.suse.com/security/cve/CVE-2024-47723.html
* https://www.suse.com/security/cve/CVE-2024-47728.html
* https://www.suse.com/security/cve/CVE-2024-47735.html
* https://www.suse.com/security/cve/CVE-2024-47737.html
* https://www.suse.com/security/cve/CVE-2024-47742.html
* https://www.suse.com/security/cve/CVE-2024-47745.html
* https://www.suse.com/security/cve/CVE-2024-47749.html
* https://www.suse.com/security/cve/CVE-2024-47756.html
* https://www.suse.com/security/cve/CVE-2024-47757.html
* https://www.suse.com/security/cve/CVE-2024-49850.html
* https://www.suse.com/security/cve/CVE-2024-49851.html
* https://www.suse.com/security/cve/CVE-2024-49852.html
* https://www.suse.com/security/cve/CVE-2024-49855.html
* https://www.suse.com/security/cve/CVE-2024-49861.html
* https://www.suse.com/security/cve/CVE-2024-49863.html
* https://www.suse.com/security/cve/CVE-2024-49868.html
* https://www.suse.com/security/cve/CVE-2024-49870.html
* https://www.suse.com/security/cve/CVE-2024-49871.html
* https://www.suse.com/security/cve/CVE-2024-49875.html
* https://www.suse.com/security/cve/CVE-2024-49877.html
* https://www.suse.com/security/cve/CVE-2024-49879.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49891.html
* https://www.suse.com/security/cve/CVE-2024-49900.html
* https://www.suse.com/security/cve/CVE-2024-49902.html
* https://www.suse.com/security/cve/CVE-2024-49903.html
* https://www.suse.com/security/cve/CVE-2024-49905.html
* https://www.suse.com/security/cve/CVE-2024-49907.html
* https://www.suse.com/security/cve/CVE-2024-49908.html
* https://www.suse.com/security/cve/CVE-2024-49921.html
* https://www.suse.com/security/cve/CVE-2024-49924.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-49934.html
* https://www.suse.com/security/cve/CVE-2024-49935.html
* https://www.suse.com/security/cve/CVE-2024-49938.html
* https://www.suse.com/security/cve/CVE-2024-49945.html
* https://www.suse.com/security/cve/CVE-2024-49947.html
* https://www.suse.com/security/cve/CVE-2024-49950.html
* https://www.suse.com/security/cve/CVE-2024-49957.html
* https://www.suse.com/security/cve/CVE-2024-49963.html
* https://www.suse.com/security/cve/CVE-2024-49965.html
* https://www.suse.com/security/cve/CVE-2024-49966.html
* https://www.suse.com/security/cve/CVE-2024-49968.html
* https://www.suse.com/security/cve/CVE-2024-49981.html
* https://www.suse.com/security/cve/CVE-2024-49983.html
* https://www.suse.com/security/cve/CVE-2024-49985.html
* https://www.suse.com/security/cve/CVE-2024-49989.html
* https://www.suse.com/security/cve/CVE-2024-50003.html
* https://www.suse.com/security/cve/CVE-2024-50007.html
* https://www.suse.com/security/cve/CVE-2024-50008.html
* https://www.suse.com/security/cve/CVE-2024-50009.html
* https://www.suse.com/security/cve/CVE-2024-50013.html
* https://www.suse.com/security/cve/CVE-2024-50017.html
* https://www.suse.com/security/cve/CVE-2024-50025.html
* https://www.suse.com/security/cve/CVE-2024-50026.html
* https://www.suse.com/security/cve/CVE-2024-50031.html
* https://www.suse.com/security/cve/CVE-2024-50044.html
* https://www.suse.com/security/cve/CVE-2024-50062.html
* https://www.suse.com/security/cve/CVE-2024-50067.html
* https://www.suse.com/security/cve/CVE-2024-50073.html
* https://www.suse.com/security/cve/CVE-2024-50074.html
* https://www.suse.com/security/cve/CVE-2024-50077.html
* https://www.suse.com/security/cve/CVE-2024-50078.html
* https://www.suse.com/security/cve/CVE-2024-50082.html
* https://www.suse.com/security/cve/CVE-2024-50089.html
* https://www.suse.com/security/cve/CVE-2024-50093.html
* https://www.suse.com/security/cve/CVE-2024-50095.html
* https://www.suse.com/security/cve/CVE-2024-50096.html
* https://www.suse.com/security/cve/CVE-2024-50098.html
* https://www.suse.com/security/cve/CVE-2024-50099.html
* https://www.suse.com/security/cve/CVE-2024-50103.html
* https://www.suse.com/security/cve/CVE-2024-50108.html
* https://www.suse.com/security/cve/CVE-2024-50110.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50116.html
* https://www.suse.com/security/cve/CVE-2024-50117.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50128.html
* https://www.suse.com/security/cve/CVE-2024-50131.html
* https://www.suse.com/security/cve/CVE-2024-50134.html
* https://www.suse.com/security/cve/CVE-2024-50135.html
* https://www.suse.com/security/cve/CVE-2024-50138.html
* https://www.suse.com/security/cve/CVE-2024-50141.html
* https://www.suse.com/security/cve/CVE-2024-50146.html
* https://www.suse.com/security/cve/CVE-2024-50147.html
* https://www.suse.com/security/cve/CVE-2024-50148.html
* https://www.suse.com/security/cve/CVE-2024-50150.html
* https://www.suse.com/security/cve/CVE-2024-50153.html
* https://www.suse.com/security/cve/CVE-2024-50154.html
* https://www.suse.com/security/cve/CVE-2024-50155.html
* https://www.suse.com/security/cve/CVE-2024-50156.html
* https://www.suse.com/security/cve/CVE-2024-50160.html
* https://www.suse.com/security/cve/CVE-2024-50167.html
* https://www.suse.com/security/cve/CVE-2024-50171.html
* https://www.suse.com/security/cve/CVE-2024-50179.html
* https://www.suse.com/security/cve/CVE-2024-50180.html
* https://www.suse.com/security/cve/CVE-2024-50182.html
* https://www.suse.com/security/cve/CVE-2024-50183.html
* https://www.suse.com/security/cve/CVE-2024-50184.html
* https://www.suse.com/security/cve/CVE-2024-50186.html
* https://www.suse.com/security/cve/CVE-2024-50187.html
* https://www.suse.com/security/cve/CVE-2024-50188.html
* https://www.suse.com/security/cve/CVE-2024-50189.html
* https://www.suse.com/security/cve/CVE-2024-50192.html
* https://www.suse.com/security/cve/CVE-2024-50194.html
* https://www.suse.com/security/cve/CVE-2024-50195.html
* https://www.suse.com/security/cve/CVE-2024-50196.html
* https://www.suse.com/security/cve/CVE-2024-50198.html
* https://www.suse.com/security/cve/CVE-2024-50201.html
* https://www.suse.com/security/cve/CVE-2024-50205.html
* https://www.suse.com/security/cve/CVE-2024-50208.html
* https://www.suse.com/security/cve/CVE-2024-50209.html
* https://www.suse.com/security/cve/CVE-2024-50215.html
* https://www.suse.com/security/cve/CVE-2024-50218.html
* https://www.suse.com/security/cve/CVE-2024-50229.html
* https://www.suse.com/security/cve/CVE-2024-50230.html
* https://www.suse.com/security/cve/CVE-2024-50232.html
* https://www.suse.com/security/cve/CVE-2024-50233.html
* https://www.suse.com/security/cve/CVE-2024-50234.html
* https://www.suse.com/security/cve/CVE-2024-50236.html
* https://www.suse.com/security/cve/CVE-2024-50237.html
* https://www.suse.com/security/cve/CVE-2024-50249.html
* https://www.suse.com/security/cve/CVE-2024-50255.html
* https://www.suse.com/security/cve/CVE-2024-50259.html
* https://www.suse.com/security/cve/CVE-2024-50261.html
* https://www.suse.com/security/cve/CVE-2024-50264.html
* https://www.suse.com/security/cve/CVE-2024-50265.html
* https://www.suse.com/security/cve/CVE-2024-50267.html
* https://www.suse.com/security/cve/CVE-2024-50268.html
* https://www.suse.com/security/cve/CVE-2024-50269.html
* https://www.suse.com/security/cve/CVE-2024-50271.html
* https://www.suse.com/security/cve/CVE-2024-50273.html
* https://www.suse.com/security/cve/CVE-2024-50274.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50282.html
* https://www.suse.com/security/cve/CVE-2024-50287.html
* https://www.suse.com/security/cve/CVE-2024-50289.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-50292.html
* https://www.suse.com/security/cve/CVE-2024-50295.html
* https://www.suse.com/security/cve/CVE-2024-50298.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-50302.html
* https://www.suse.com/security/cve/CVE-2024-53052.html
* https://www.suse.com/security/cve/CVE-2024-53058.html
* https://www.suse.com/security/cve/CVE-2024-53059.html
* https://www.suse.com/security/cve/CVE-2024-53060.html
* https://www.suse.com/security/cve/CVE-2024-53061.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53066.html
* https://www.suse.com/security/cve/CVE-2024-53068.html
* https://www.suse.com/security/cve/CVE-2024-53079.html
* https://www.suse.com/security/cve/CVE-2024-53085.html
* https://www.suse.com/security/cve/CVE-2024-53088.html
* https://www.suse.com/security/cve/CVE-2024-53104.html
* https://www.suse.com/security/cve/CVE-2024-53110.html
* https://bugzilla.suse.com/show_bug.cgi?id=1082555
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1220382
* https://bugzilla.suse.com/show_bug.cgi?id=1221309
* https://bugzilla.suse.com/show_bug.cgi?id=1221333
* https://bugzilla.suse.com/show_bug.cgi?id=1222364
* https://bugzilla.suse.com/show_bug.cgi?id=1222590
* https://bugzilla.suse.com/show_bug.cgi?id=1223202
* https://bugzilla.suse.com/show_bug.cgi?id=1223656
* https://bugzilla.suse.com/show_bug.cgi?id=1223848
* https://bugzilla.suse.com/show_bug.cgi?id=1223919
* https://bugzilla.suse.com/show_bug.cgi?id=1223942
* https://bugzilla.suse.com/show_bug.cgi?id=1224518
* https://bugzilla.suse.com/show_bug.cgi?id=1224526
* https://bugzilla.suse.com/show_bug.cgi?id=1224574
* https://bugzilla.suse.com/show_bug.cgi?id=1225725
* https://bugzilla.suse.com/show_bug.cgi?id=1225730
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1225764
* https://bugzilla.suse.com/show_bug.cgi?id=1225812
* https://bugzilla.suse.com/show_bug.cgi?id=1226560
* https://bugzilla.suse.com/show_bug.cgi?id=1226592
* https://bugzilla.suse.com/show_bug.cgi?id=1226631
* https://bugzilla.suse.com/show_bug.cgi?id=1226748
* https://bugzilla.suse.com/show_bug.cgi?id=1226872
* https://bugzilla.suse.com/show_bug.cgi?id=1227853
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228430
* https://bugzilla.suse.com/show_bug.cgi?id=1228486
* https://bugzilla.suse.com/show_bug.cgi?id=1228650
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://bugzilla.suse.com/show_bug.cgi?id=1229312
* https://bugzilla.suse.com/show_bug.cgi?id=1229429
* https://bugzilla.suse.com/show_bug.cgi?id=1229585
* https://bugzilla.suse.com/show_bug.cgi?id=1229752
* https://bugzilla.suse.com/show_bug.cgi?id=1229808
* https://bugzilla.suse.com/show_bug.cgi?id=1230055
* https://bugzilla.suse.com/show_bug.cgi?id=1230220
* https://bugzilla.suse.com/show_bug.cgi?id=1230231
* https://bugzilla.suse.com/show_bug.cgi?id=1230270
* https://bugzilla.suse.com/show_bug.cgi?id=1230558
* https://bugzilla.suse.com/show_bug.cgi?id=1230827
* https://bugzilla.suse.com/show_bug.cgi?id=1230918
* https://bugzilla.suse.com/show_bug.cgi?id=1231083
* https://bugzilla.suse.com/show_bug.cgi?id=1231089
* https://bugzilla.suse.com/show_bug.cgi?id=1231098
* https://bugzilla.suse.com/show_bug.cgi?id=1231101
* https://bugzilla.suse.com/show_bug.cgi?id=1231108
* https://bugzilla.suse.com/show_bug.cgi?id=1231111
* https://bugzilla.suse.com/show_bug.cgi?id=1231132
* https://bugzilla.suse.com/show_bug.cgi?id=1231135
* https://bugzilla.suse.com/show_bug.cgi?id=1231138
* https://bugzilla.suse.com/show_bug.cgi?id=1231169
* https://bugzilla.suse.com/show_bug.cgi?id=1231178
* https://bugzilla.suse.com/show_bug.cgi?id=1231180
* https://bugzilla.suse.com/show_bug.cgi?id=1231181
* https://bugzilla.suse.com/show_bug.cgi?id=1231187
* https://bugzilla.suse.com/show_bug.cgi?id=1231202
* https://bugzilla.suse.com/show_bug.cgi?id=1231434
* https://bugzilla.suse.com/show_bug.cgi?id=1231441
* https://bugzilla.suse.com/show_bug.cgi?id=1231452
* https://bugzilla.suse.com/show_bug.cgi?id=1231465
* https://bugzilla.suse.com/show_bug.cgi?id=1231474
* https://bugzilla.suse.com/show_bug.cgi?id=1231481
* https://bugzilla.suse.com/show_bug.cgi?id=1231537
* https://bugzilla.suse.com/show_bug.cgi?id=1231541
* https://bugzilla.suse.com/show_bug.cgi?id=1231646
* https://bugzilla.suse.com/show_bug.cgi?id=1231849
* https://bugzilla.suse.com/show_bug.cgi?id=1231856
* https://bugzilla.suse.com/show_bug.cgi?id=1231858
* https://bugzilla.suse.com/show_bug.cgi?id=1231859
* https://bugzilla.suse.com/show_bug.cgi?id=1231864
* https://bugzilla.suse.com/show_bug.cgi?id=1231904
* https://bugzilla.suse.com/show_bug.cgi?id=1231916
* https://bugzilla.suse.com/show_bug.cgi?id=1231920
* https://bugzilla.suse.com/show_bug.cgi?id=1231923
* https://bugzilla.suse.com/show_bug.cgi?id=1231930
* https://bugzilla.suse.com/show_bug.cgi?id=1231931
* https://bugzilla.suse.com/show_bug.cgi?id=1231947
* https://bugzilla.suse.com/show_bug.cgi?id=1231952
* https://bugzilla.suse.com/show_bug.cgi?id=1231953
* https://bugzilla.suse.com/show_bug.cgi?id=1231959
* https://bugzilla.suse.com/show_bug.cgi?id=1231978
* https://bugzilla.suse.com/show_bug.cgi?id=1232013
* https://bugzilla.suse.com/show_bug.cgi?id=1232015
* https://bugzilla.suse.com/show_bug.cgi?id=1232016
* https://bugzilla.suse.com/show_bug.cgi?id=1232017
* https://bugzilla.suse.com/show_bug.cgi?id=1232027
* https://bugzilla.suse.com/show_bug.cgi?id=1232028
* https://bugzilla.suse.com/show_bug.cgi?id=1232047
* https://bugzilla.suse.com/show_bug.cgi?id=1232048
* https://bugzilla.suse.com/show_bug.cgi?id=1232050
* https://bugzilla.suse.com/show_bug.cgi?id=1232056
* https://bugzilla.suse.com/show_bug.cgi?id=1232076
* https://bugzilla.suse.com/show_bug.cgi?id=1232080
* https://bugzilla.suse.com/show_bug.cgi?id=1232094
* https://bugzilla.suse.com/show_bug.cgi?id=1232096
* https://bugzilla.suse.com/show_bug.cgi?id=1232098
* https://bugzilla.suse.com/show_bug.cgi?id=1232111
* https://bugzilla.suse.com/show_bug.cgi?id=1232126
* https://bugzilla.suse.com/show_bug.cgi?id=1232134
* https://bugzilla.suse.com/show_bug.cgi?id=1232135
* https://bugzilla.suse.com/show_bug.cgi?id=1232141
* https://bugzilla.suse.com/show_bug.cgi?id=1232142
* https://bugzilla.suse.com/show_bug.cgi?id=1232147
* https://bugzilla.suse.com/show_bug.cgi?id=1232152
* https://bugzilla.suse.com/show_bug.cgi?id=1232159
* https://bugzilla.suse.com/show_bug.cgi?id=1232162
* https://bugzilla.suse.com/show_bug.cgi?id=1232165
* https://bugzilla.suse.com/show_bug.cgi?id=1232180
* https://bugzilla.suse.com/show_bug.cgi?id=1232185
* https://bugzilla.suse.com/show_bug.cgi?id=1232187
* https://bugzilla.suse.com/show_bug.cgi?id=1232189
* https://bugzilla.suse.com/show_bug.cgi?id=1232195
* https://bugzilla.suse.com/show_bug.cgi?id=1232198
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232218
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1232232
* https://bugzilla.suse.com/show_bug.cgi?id=1232254
* https://bugzilla.suse.com/show_bug.cgi?id=1232255
* https://bugzilla.suse.com/show_bug.cgi?id=1232264
* https://bugzilla.suse.com/show_bug.cgi?id=1232272
* https://bugzilla.suse.com/show_bug.cgi?id=1232279
* https://bugzilla.suse.com/show_bug.cgi?id=1232287
* https://bugzilla.suse.com/show_bug.cgi?id=1232293
* https://bugzilla.suse.com/show_bug.cgi?id=1232312
* https://bugzilla.suse.com/show_bug.cgi?id=1232317
* https://bugzilla.suse.com/show_bug.cgi?id=1232318
* https://bugzilla.suse.com/show_bug.cgi?id=1232333
* https://bugzilla.suse.com/show_bug.cgi?id=1232334
* https://bugzilla.suse.com/show_bug.cgi?id=1232335
* https://bugzilla.suse.com/show_bug.cgi?id=1232339
* https://bugzilla.suse.com/show_bug.cgi?id=1232349
* https://bugzilla.suse.com/show_bug.cgi?id=1232357
* https://bugzilla.suse.com/show_bug.cgi?id=1232359
* https://bugzilla.suse.com/show_bug.cgi?id=1232362
* https://bugzilla.suse.com/show_bug.cgi?id=1232364
* https://bugzilla.suse.com/show_bug.cgi?id=1232370
* https://bugzilla.suse.com/show_bug.cgi?id=1232371
* https://bugzilla.suse.com/show_bug.cgi?id=1232378
* https://bugzilla.suse.com/show_bug.cgi?id=1232385
* https://bugzilla.suse.com/show_bug.cgi?id=1232387
* https://bugzilla.suse.com/show_bug.cgi?id=1232394
* https://bugzilla.suse.com/show_bug.cgi?id=1232413
* https://bugzilla.suse.com/show_bug.cgi?id=1232416
* https://bugzilla.suse.com/show_bug.cgi?id=1232436
* https://bugzilla.suse.com/show_bug.cgi?id=1232483
* https://bugzilla.suse.com/show_bug.cgi?id=1232500
* https://bugzilla.suse.com/show_bug.cgi?id=1232503
* https://bugzilla.suse.com/show_bug.cgi?id=1232504
* https://bugzilla.suse.com/show_bug.cgi?id=1232507
* https://bugzilla.suse.com/show_bug.cgi?id=1232520
* https://bugzilla.suse.com/show_bug.cgi?id=1232552
* https://bugzilla.suse.com/show_bug.cgi?id=1232757
* https://bugzilla.suse.com/show_bug.cgi?id=1232819
* https://bugzilla.suse.com/show_bug.cgi?id=1232860
* https://bugzilla.suse.com/show_bug.cgi?id=1232870
* https://bugzilla.suse.com/show_bug.cgi?id=1232873
* https://bugzilla.suse.com/show_bug.cgi?id=1232877
* https://bugzilla.suse.com/show_bug.cgi?id=1232878
* https://bugzilla.suse.com/show_bug.cgi?id=1232881
* https://bugzilla.suse.com/show_bug.cgi?id=1232884
* https://bugzilla.suse.com/show_bug.cgi?id=1232885
* https://bugzilla.suse.com/show_bug.cgi?id=1232887
* https://bugzilla.suse.com/show_bug.cgi?id=1232888
* https://bugzilla.suse.com/show_bug.cgi?id=1232890
* https://bugzilla.suse.com/show_bug.cgi?id=1232892
* https://bugzilla.suse.com/show_bug.cgi?id=1232896
* https://bugzilla.suse.com/show_bug.cgi?id=1232897
* https://bugzilla.suse.com/show_bug.cgi?id=1232905
* https://bugzilla.suse.com/show_bug.cgi?id=1232907
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1232926
* https://bugzilla.suse.com/show_bug.cgi?id=1232928
* https://bugzilla.suse.com/show_bug.cgi?id=1232935
* https://bugzilla.suse.com/show_bug.cgi?id=1233035
* https://bugzilla.suse.com/show_bug.cgi?id=1233049
* https://bugzilla.suse.com/show_bug.cgi?id=1233051
* https://bugzilla.suse.com/show_bug.cgi?id=1233056
* https://bugzilla.suse.com/show_bug.cgi?id=1233057
* https://bugzilla.suse.com/show_bug.cgi?id=1233061
* https://bugzilla.suse.com/show_bug.cgi?id=1233063
* https://bugzilla.suse.com/show_bug.cgi?id=1233065
* https://bugzilla.suse.com/show_bug.cgi?id=1233067
* https://bugzilla.suse.com/show_bug.cgi?id=1233070
* https://bugzilla.suse.com/show_bug.cgi?id=1233073
* https://bugzilla.suse.com/show_bug.cgi?id=1233074
* https://bugzilla.suse.com/show_bug.cgi?id=1233100
* https://bugzilla.suse.com/show_bug.cgi?id=1233103
* https://bugzilla.suse.com/show_bug.cgi?id=1233104
* https://bugzilla.suse.com/show_bug.cgi?id=1233105
* https://bugzilla.suse.com/show_bug.cgi?id=1233106
* https://bugzilla.suse.com/show_bug.cgi?id=1233107
* https://bugzilla.suse.com/show_bug.cgi?id=1233108
* https://bugzilla.suse.com/show_bug.cgi?id=1233110
* https://bugzilla.suse.com/show_bug.cgi?id=1233111
* https://bugzilla.suse.com/show_bug.cgi?id=1233113
* https://bugzilla.suse.com/show_bug.cgi?id=1233114
* https://bugzilla.suse.com/show_bug.cgi?id=1233117
* https://bugzilla.suse.com/show_bug.cgi?id=1233123
* https://bugzilla.suse.com/show_bug.cgi?id=1233125
* https://bugzilla.suse.com/show_bug.cgi?id=1233129
* https://bugzilla.suse.com/show_bug.cgi?id=1233130
* https://bugzilla.suse.com/show_bug.cgi?id=1233134
* https://bugzilla.suse.com/show_bug.cgi?id=1233135
* https://bugzilla.suse.com/show_bug.cgi?id=1233150
* https://bugzilla.suse.com/show_bug.cgi?id=1233189
* https://bugzilla.suse.com/show_bug.cgi?id=1233191
* https://bugzilla.suse.com/show_bug.cgi?id=1233197
* https://bugzilla.suse.com/show_bug.cgi?id=1233205
* https://bugzilla.suse.com/show_bug.cgi?id=1233206
* https://bugzilla.suse.com/show_bug.cgi?id=1233209
* https://bugzilla.suse.com/show_bug.cgi?id=1233210
* https://bugzilla.suse.com/show_bug.cgi?id=1233211
* https://bugzilla.suse.com/show_bug.cgi?id=1233212
* https://bugzilla.suse.com/show_bug.cgi?id=1233214
* https://bugzilla.suse.com/show_bug.cgi?id=1233216
* https://bugzilla.suse.com/show_bug.cgi?id=1233238
* https://bugzilla.suse.com/show_bug.cgi?id=1233241
* https://bugzilla.suse.com/show_bug.cgi?id=1233253
* https://bugzilla.suse.com/show_bug.cgi?id=1233255
* https://bugzilla.suse.com/show_bug.cgi?id=1233293
* https://bugzilla.suse.com/show_bug.cgi?id=1233350
* https://bugzilla.suse.com/show_bug.cgi?id=1233452
* https://bugzilla.suse.com/show_bug.cgi?id=1233453
* https://bugzilla.suse.com/show_bug.cgi?id=1233454
* https://bugzilla.suse.com/show_bug.cgi?id=1233456
* https://bugzilla.suse.com/show_bug.cgi?id=1233457
* https://bugzilla.suse.com/show_bug.cgi?id=1233458
* https://bugzilla.suse.com/show_bug.cgi?id=1233460
* https://bugzilla.suse.com/show_bug.cgi?id=1233462
* https://bugzilla.suse.com/show_bug.cgi?id=1233463
* https://bugzilla.suse.com/show_bug.cgi?id=1233468
* https://bugzilla.suse.com/show_bug.cgi?id=1233471
* https://bugzilla.suse.com/show_bug.cgi?id=1233476
* https://bugzilla.suse.com/show_bug.cgi?id=1233478
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233481
* https://bugzilla.suse.com/show_bug.cgi?id=1233484
* https://bugzilla.suse.com/show_bug.cgi?id=1233487
* https://bugzilla.suse.com/show_bug.cgi?id=1233490
* https://bugzilla.suse.com/show_bug.cgi?id=1233491
* https://bugzilla.suse.com/show_bug.cgi?id=1233528
* https://bugzilla.suse.com/show_bug.cgi?id=1233548
* https://bugzilla.suse.com/show_bug.cgi?id=1233552
* https://bugzilla.suse.com/show_bug.cgi?id=1233553
* https://bugzilla.suse.com/show_bug.cgi?id=1233554
* https://bugzilla.suse.com/show_bug.cgi?id=1233555
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233560
* https://bugzilla.suse.com/show_bug.cgi?id=1233561
* https://bugzilla.suse.com/show_bug.cgi?id=1233570
* https://bugzilla.suse.com/show_bug.cgi?id=1233577
* https://bugzilla.suse.com/show_bug.cgi?id=1233580
* https://bugzilla.suse.com/show_bug.cgi?id=1233977
* https://bugzilla.suse.com/show_bug.cgi?id=1234012
* https://bugzilla.suse.com/show_bug.cgi?id=1234025
* https://bugzilla.suse.com/show_bug.cgi?id=1234085
* https://bugzilla.suse.com/show_bug.cgi?id=1234093
* https://bugzilla.suse.com/show_bug.cgi?id=1234098
* https://bugzilla.suse.com/show_bug.cgi?id=1234108
1
0
13 Dec '24
# Recommended update for hawk2
Announcement ID: SUSE-RU-2024:4309-1
Release Date: 2024-12-13T08:22:09Z
Rating: moderate
References:
* bsc#1232760
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Availability Extension 15 SP2
* SUSE Linux Enterprise High Availability Extension 15 SP3
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Availability Extension 15 SP5
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 Business Critical Linux
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 Business Critical Linux
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.1
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for hawk2 fixes the following issues:
* Fixed executable external commands (bsc#1232760)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4309=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4309=1
* SUSE Linux Enterprise High Availability Extension 15 SP2
zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-4309=1
* SUSE Linux Enterprise High Availability Extension 15 SP3
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-4309=1
* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-4309=1
* SUSE Linux Enterprise High Availability Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-4309=1
* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-4309=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* hawk2-debugsource-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-debuginfo-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* hawk2-debugsource-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-debuginfo-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le
s390x x86_64)
* hawk2-debugsource-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-debuginfo-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
s390x x86_64)
* hawk2-debugsource-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-debuginfo-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* hawk2-debugsource-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-debuginfo-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le
s390x x86_64)
* hawk2-debugsource-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-debuginfo-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* hawk2-debugsource-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-debuginfo-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
* hawk2-2.6.5+git.1731582159.c5ff4329-150000.3.56.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1232760
1
0
13 Dec '24
# Recommended update for go1.23-openssl
Announcement ID: SUSE-RU-2024:4307-1
Release Date: 2024-12-13T07:45:54Z
Rating: moderate
References:
* bsc#1233306
Affected Products:
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for go1.23-openssl fixes the following issues:
* Write three digit version to file VERSION which sets go env GOVERSION. Fixes
bsc#1233306.
* Go toolchain file VERSION sets the immutable value for go env GOVERSION
* go1.x-openssl toolchains have used a bespoke fourth digit to represent the
upstream patch set release number, e.g. go1.22.9-1-openssl-fips. This digit
has not been needed.
* Some Go applications including helm break when this fourth digit is present
in VERSION, with error: go.mod requires go >= 1.22.0 (running go 1.22;
GOTOOLCHAIN=local)
* Keep the fourth digit in the packaging for now, it will be dropped in the
next toolchain version update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4307=1 openSUSE-SLE-15.6-2024-4307=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4307=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* go1.23-openssl-debuginfo-1.23.2.2-150600.13.6.1
* go1.23-openssl-1.23.2.2-150600.13.6.1
* go1.23-openssl-doc-1.23.2.2-150600.13.6.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.23-openssl-race-1.23.2.2-150600.13.6.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* go1.23-openssl-race-1.23.2.2-150600.13.6.1
* go1.23-openssl-debuginfo-1.23.2.2-150600.13.6.1
* go1.23-openssl-1.23.2.2-150600.13.6.1
* go1.23-openssl-doc-1.23.2.2-150600.13.6.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1233306
1
0
13 Dec '24
# Recommended update for go1.22-openssl
Announcement ID: SUSE-RU-2024:4308-1
Release Date: 2024-12-13T07:46:02Z
Rating: moderate
References:
* bsc#1233306
Affected Products:
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for go1.22-openssl fixes the following issues:
* Write three digit version to file VERSION which sets go env GOVERSION. Fixes
bsc#1233306.
* Go toolchain file VERSION sets the immutable value for go env GOVERSION
* go1.x-openssl toolchains have used a bespoke fourth digit to represent the
upstream patch set release number, e.g. go1.22.9-1-openssl-fips. This digit
has not been needed.
* Some Go applications including helm break when this fourth digit is present
in VERSION, with error: go.mod requires go >= 1.22.0 (running go 1.22;
GOTOOLCHAIN=local)
* Keep the fourth digit in the packaging for now, it will be dropped in the
next toolchain version update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4308=1 SUSE-2024-4308=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4308=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* go1.22-openssl-1.22.7.1-150600.13.5.1
* go1.22-openssl-doc-1.22.7.1-150600.13.5.1
* go1.22-openssl-debuginfo-1.22.7.1-150600.13.5.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.22-openssl-race-1.22.7.1-150600.13.5.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* go1.22-openssl-1.22.7.1-150600.13.5.1
* go1.22-openssl-doc-1.22.7.1-150600.13.5.1
* go1.22-openssl-debuginfo-1.22.7.1-150600.13.5.1
* go1.22-openssl-race-1.22.7.1-150600.13.5.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1233306
1
0
12 Dec '24
# Security update for buildah
Announcement ID: SUSE-SU-2024:4303-1
Release Date: 2024-12-12T12:50:24Z
Rating: moderate
References:
* bsc#1231208
* bsc#1231230
* bsc#1231499
* bsc#1231698
* bsc#1232522
Cross-References:
* CVE-2024-9341
* CVE-2024-9407
* CVE-2024-9675
* CVE-2024-9676
CVSS scores:
* CVE-2024-9341 ( SUSE ): 5.8
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-9341 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
* CVE-2024-9341 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
* CVE-2024-9341 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
* CVE-2024-9407 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-9407 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N
* CVE-2024-9407 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N
* CVE-2024-9675 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
* CVE-2024-9675 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-9675 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-9676 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-9676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-9676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-9676 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves four vulnerabilities and has one security fix can now be
installed.
## Description:
This update for buildah fixes the following issues:
Security issues fixed:
* CVE-2024-9675: cache arbitrary directory mount (bsc#1231499)
* CVE-2024-9407: Improper Input Validation in bind-propagation Option of
Dockerfile RUN --mount Instruction (bsc#1231208)
* CVE-2024-9676: symlink traversal vulnerability in the containers/storage
library can cause denial of service (bsc#1231698)
* CVE-2024-9341: FIPS Crypto-Policy Directory Mounting Issue in
containers/common Go Library (bsc#1231230)
Non-security issue fixed:
* default to slirp4netns on SLE instead of pasta (bsc#1232522)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4303=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4303=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4303=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4303=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4303=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.35.4-150300.8.28.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* buildah-1.35.4-150300.8.28.3
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* buildah-1.35.4-150300.8.28.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* buildah-1.35.4-150300.8.28.3
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* buildah-1.35.4-150300.8.28.3
## References:
* https://www.suse.com/security/cve/CVE-2024-9341.html
* https://www.suse.com/security/cve/CVE-2024-9407.html
* https://www.suse.com/security/cve/CVE-2024-9675.html
* https://www.suse.com/security/cve/CVE-2024-9676.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231208
* https://bugzilla.suse.com/show_bug.cgi?id=1231230
* https://bugzilla.suse.com/show_bug.cgi?id=1231499
* https://bugzilla.suse.com/show_bug.cgi?id=1231698
* https://bugzilla.suse.com/show_bug.cgi?id=1232522
1
0
# Security update for qemu
Announcement ID: SUSE-SU-2024:4304-1
Release Date: 2024-12-12T13:22:09Z
Rating: important
References:
* bsc#1229007
* bsc#1230834
* bsc#1230915
Cross-References:
* CVE-2024-7409
* CVE-2024-8354
* CVE-2024-8612
CVSS scores:
* CVE-2024-7409 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-7409 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8354 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-8354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8354 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8354 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8612 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-8612 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
* CVE-2024-8612 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves three vulnerabilities can now be installed.
## Description:
This update for qemu fixes the following issues:
* CVE-2024-7409: Fixed denial of service via improper synchronization in QEMU
NBD Server during socket closure (bsc#1229007)
* CVE-2024-8354: Fixed assertion failure in usb_ep_get() in usb (bsc#1230834)
* CVE-2024-8612: Fixed information leak in virtio devices (bsc#1230915)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4304=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4304=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4304=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4304=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4304=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4304=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4304=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4304=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4304=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4304=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4304=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4304=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4304=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-block-gluster-6.2.0-150400.37.37.3
* qemu-audio-jack-6.2.0-150400.37.37.3
* qemu-hw-usb-smartcard-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ivshmem-tools-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-jack-debuginfo-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-arm-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-accel-qtest-6.2.0-150400.37.37.3
* qemu-block-gluster-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-linux-user-debuginfo-6.2.0-150400.37.37.2
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-block-nfs-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-block-nfs-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-ppc-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-ppc-6.2.0-150400.37.37.3
* qemu-extra-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-smartcard-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-block-dmg-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* qemu-linux-user-debugsource-6.2.0-150400.37.37.2
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-oss-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-vhost-user-gpu-6.2.0-150400.37.37.3
* qemu-vhost-user-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-dmg-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-oss-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-linux-user-6.2.0-150400.37.37.2
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-ivshmem-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* qemu-extra-6.2.0-150400.37.37.3
* qemu-accel-qtest-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* openSUSE Leap 15.4 (s390x x86_64 i586)
* qemu-kvm-6.2.0-150400.37.37.3
* openSUSE Leap 15.4 (noarch)
* qemu-skiboot-6.2.0-150400.37.37.3
* qemu-SLOF-6.2.0-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* qemu-microvm-6.2.0-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (s390x)
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* qemu-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.3 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.3 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Micro 5.3 (s390x)
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* qemu-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (s390x)
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* qemu-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.4 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.4 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Micro 5.4 (s390x)
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* qemu-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64)
* qemu-arm-6.2.0-150400.37.37.3
* qemu-arm-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64)
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* qemu-skiboot-6.2.0-150400.37.37.3
* qemu-SLOF-6.2.0-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (ppc64le)
* qemu-ppc-debuginfo-6.2.0-150400.37.37.3
* qemu-ppc-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (s390x x86_64)
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (s390x)
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.37.3
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.37.3
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* qemu-skiboot-6.2.0-150400.37.37.3
* qemu-SLOF-6.2.0-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le)
* qemu-ppc-debuginfo-6.2.0-150400.37.37.3
* qemu-ppc-6.2.0-150400.37.37.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* SUSE Manager Proxy 4.3 (x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Manager Proxy 4.3 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Manager Retail Branch Server 4.3 (noarch)
* qemu-sgabios-8-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* qemu-tools-debuginfo-6.2.0-150400.37.37.3
* qemu-block-ssh-debuginfo-6.2.0-150400.37.37.3
* qemu-6.2.0-150400.37.37.3
* qemu-ui-curses-6.2.0-150400.37.37.3
* qemu-tools-6.2.0-150400.37.37.3
* qemu-ksm-6.2.0-150400.37.37.3
* qemu-ui-curses-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-debuginfo-6.2.0-150400.37.37.3
* qemu-lang-6.2.0-150400.37.37.3
* qemu-block-ssh-6.2.0-150400.37.37.3
* qemu-hw-usb-host-6.2.0-150400.37.37.3
* qemu-chardev-baum-debuginfo-6.2.0-150400.37.37.3
* qemu-block-iscsi-debuginfo-6.2.0-150400.37.37.3
* qemu-debuginfo-6.2.0-150400.37.37.3
* qemu-block-curl-6.2.0-150400.37.37.3
* qemu-debugsource-6.2.0-150400.37.37.3
* qemu-block-iscsi-6.2.0-150400.37.37.3
* qemu-block-rbd-debuginfo-6.2.0-150400.37.37.3
* qemu-guest-agent-6.2.0-150400.37.37.3
* qemu-block-rbd-6.2.0-150400.37.37.3
* qemu-chardev-baum-6.2.0-150400.37.37.3
* qemu-block-curl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-host-debuginfo-6.2.0-150400.37.37.3
* SUSE Manager Server 4.3 (noarch)
* qemu-skiboot-6.2.0-150400.37.37.3
* qemu-SLOF-6.2.0-150400.37.37.3
* qemu-sgabios-8-150400.37.37.3
* qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* qemu-ipxe-1.0.0+-150400.37.37.3
* qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.37.3
* SUSE Manager Server 4.3 (ppc64le x86_64)
* qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-app-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-6.2.0-150400.37.37.3
* qemu-ui-spice-app-6.2.0-150400.37.37.3
* qemu-ui-gtk-6.2.0-150400.37.37.3
* qemu-audio-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-6.2.0-150400.37.37.3
* qemu-ui-gtk-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-opengl-debuginfo-6.2.0-150400.37.37.3
* qemu-ui-spice-core-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-usb-redirect-6.2.0-150400.37.37.3
* qemu-chardev-spice-6.2.0-150400.37.37.3
* qemu-chardev-spice-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-qxl-6.2.0-150400.37.37.3
* qemu-audio-spice-6.2.0-150400.37.37.3
* SUSE Manager Server 4.3 (ppc64le)
* qemu-ppc-debuginfo-6.2.0-150400.37.37.3
* qemu-ppc-6.2.0-150400.37.37.3
* SUSE Manager Server 4.3 (s390x x86_64)
* qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.37.3
* qemu-kvm-6.2.0-150400.37.37.3
* qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.37.3
* SUSE Manager Server 4.3 (s390x)
* qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.37.3
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.37.3
* qemu-s390x-6.2.0-150400.37.37.3
* qemu-s390x-debuginfo-6.2.0-150400.37.37.3
* SUSE Manager Server 4.3 (x86_64)
* qemu-audio-alsa-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-accel-tcg-x86-6.2.0-150400.37.37.3
* qemu-x86-debuginfo-6.2.0-150400.37.37.3
* qemu-x86-6.2.0-150400.37.37.3
* qemu-audio-alsa-6.2.0-150400.37.37.3
* qemu-audio-pa-debuginfo-6.2.0-150400.37.37.3
* qemu-audio-pa-6.2.0-150400.37.37.3
## References:
* https://www.suse.com/security/cve/CVE-2024-7409.html
* https://www.suse.com/security/cve/CVE-2024-8354.html
* https://www.suse.com/security/cve/CVE-2024-8612.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229007
* https://bugzilla.suse.com/show_bug.cgi?id=1230834
* https://bugzilla.suse.com/show_bug.cgi?id=1230915
1
0
SUSE-RU-2024:4305-1: moderate: Recommended update for sles-ltss-release
by OPENSUSE-UPDATES 12 Dec '24
by OPENSUSE-UPDATES 12 Dec '24
12 Dec '24
# Recommended update for sles-ltss-release
Announcement ID: SUSE-RU-2024:4305-1
Release Date: 2024-12-12T14:00:36Z
Rating: moderate
References:
* jsc#MSC-887
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
An update that contains one feature can now be installed.
## Description:
This update for sles-ltss-release fixes the following issue:
* Set product lifecycle.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4305=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2024-4305=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* sles-ltss-release-15.5-150500.16.4.4
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* sles-ltss-release-15.5-150500.16.4.4
## References:
* https://jira.suse.com/browse/MSC-887
1
0
12 Dec '24
# Security update for java-1_8_0-ibm
Announcement ID: SUSE-SU-2024:4306-1
Release Date: 2024-12-12T14:31:37Z
Rating: moderate
References:
* bsc#1225470
* bsc#1231702
* bsc#1231711
* bsc#1231716
* bsc#1231719
* bsc#1232064
Cross-References:
* CVE-2024-21208
* CVE-2024-21210
* CVE-2024-21217
* CVE-2024-21235
* CVE-2024-3933
CVSS scores:
* CVE-2024-21208 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-21208 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21208 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21210 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-21210 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-21210 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-21217 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-21217 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21217 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21235 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-21235 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-21235 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-3933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
Affected Products:
* Legacy Module 15-SP5
* Legacy Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves five vulnerabilities and has one security fix can now be
installed.
## Description:
This update for java-1_8_0-ibm fixes the following issues:
Updated to Java 8.0 Service Refresh 8 Fix Pack 35 with Oracle October 15 2024
CPU (bsc#1232064): \- CVE-2024-21208: Fixed partial DoS in component Networking
(bsc#1231702,JDK-8328286) \- CVE-2024-21210: Fixed unauthorized update, insert
or delete access to some of Oracle Java SE accessible data in component Hotspot
(bsc#1231711,JDK-8328544) \- CVE-2024-21217: Fixed partial DoS in component
Serialization (bsc#1231716,JDK-8331446) \- CVE-2024-21235: Fixed unauthorized
read/write access to data in component Hotspot (bsc#1231719,JDK-8332644)
Other issues fixed in past releases: \- CVE-2024-3933: Fixed evaluate constant
byteLenNode of arrayCopyChild (bsc#1225470)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-4306=1
* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-4306=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4306=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4306=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4306=1
* SUSE Linux Enterprise Server 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4306=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4306=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4306=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4306=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4306=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4306=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4306=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4306=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4306=1
## Package List:
* Legacy Module 15-SP5 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* Legacy Module 15-SP5 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* Legacy Module 15-SP5 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* Legacy Module 15-SP6 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* Legacy Module 15-SP6 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* Legacy Module 15-SP6 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* SUSE Enterprise Storage 7.1 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* SUSE Enterprise Storage 7.1 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.5 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.5 (x86_64)
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-32bit-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-32bit-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* java-1_8_0-ibm-src-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-demo-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.6 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.6 (x86_64)
* java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-32bit-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-32bit-1.8.0_sr8.35-150000.3.95.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* java-1_8_0-ibm-src-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1
* java-1_8_0-ibm-demo-1.8.0_sr8.35-150000.3.95.1
## References:
* https://www.suse.com/security/cve/CVE-2024-21208.html
* https://www.suse.com/security/cve/CVE-2024-21210.html
* https://www.suse.com/security/cve/CVE-2024-21217.html
* https://www.suse.com/security/cve/CVE-2024-21235.html
* https://www.suse.com/security/cve/CVE-2024-3933.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225470
* https://bugzilla.suse.com/show_bug.cgi?id=1231702
* https://bugzilla.suse.com/show_bug.cgi?id=1231711
* https://bugzilla.suse.com/show_bug.cgi?id=1231716
* https://bugzilla.suse.com/show_bug.cgi?id=1231719
* https://bugzilla.suse.com/show_bug.cgi?id=1232064
1
0
openSUSE-SU-2024:0405-1: important: Security update for chromium
by opensuse-securityďĽ opensuse.org 12 Dec '24
by opensuse-securityďĽ opensuse.org 12 Dec '24
12 Dec '24
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0405-1
Rating: important
References: #1234118
Cross-References: CVE-2024-12053
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for chromium fixes the following issues:
Chromium 131.0.6778.108 (stable released 2024-12-04) (boo#1234118)
- CVE-2024-12053: Type Confusion in V8
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-405=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 x86_64):
chromedriver-131.0.6778.108-bp156.2.59.1
chromium-131.0.6778.108-bp156.2.59.1
References:
https://www.suse.com/security/cve/CVE-2024-12053.html
https://bugzilla.suse.com/1234118
1
0
SUSE-SU-2024:4299-1: moderate: Security update for govulncheck-vulndb
by OPENSUSE-UPDATES 12 Dec '24
by OPENSUSE-UPDATES 12 Dec '24
12 Dec '24
# Security update for govulncheck-vulndb
Announcement ID: SUSE-SU-2024:4299-1
Release Date: 2024-12-12T08:10:04Z
Rating: moderate
References:
* jsc#PED-11136
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that contains one feature can now be installed.
## Description:
This update for govulncheck-vulndb fixes the following issues:
* Update to version 0.0.20241209T183251 2024-12-09T18:32:51Z (jsc#PED-11136)
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2024-3284
* GO-2024-3286
* GO-2024-3287
* GO-2024-3288
* GO-2024-3289
* GO-2024-3290
* GO-2024-3291
* GO-2024-3292
* GO-2024-3294
* GO-2024-3296
* GO-2024-3299
* GO-2024-3300
* GO-2024-3302
* GO-2024-3303
* GO-2024-3304
* GO-2024-3305
* GO-2024-3307
* GO-2024-3308
* GO-2024-3310
* GO-2024-3311
* GO-2024-3312
* GO-2024-3313
* Update to version 0.0.20241121T195252 2024-11-21T19:52:52Z (jsc#PED-11136)
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2024-3279
* GO-2024-3280
* GO-2024-3281
* GO-2024-3282
* GO-2024-3283
* Update to version 0.0.20241120T172248 2024-11-20T17:22:48Z (jsc#PED-11136)
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2024-3140
* GO-2024-3259
* GO-2024-3265
* Update to version 0.0.20241119T173509 2024-11-19T17:35:09Z (jsc#PED-11136)
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2022-0646
* GO-2024-3267
* GO-2024-3269
* GO-2024-3271
* GO-2024-3272
* GO-2024-3273
* GO-2024-3274
* GO-2024-3275
* GO-2024-3277
* GO-2024-3278
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4299=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4299=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-4299=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4299=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1
* openSUSE Leap 15.6 (noarch)
* govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1
* SUSE Package Hub 15 15-SP5 (noarch)
* govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1
* SUSE Package Hub 15 15-SP6 (noarch)
* govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1
## References:
* https://jira.suse.com/browse/PED-11136
1
0
12 Dec '24
# Security update for nodejs20
Announcement ID: SUSE-SU-2024:4300-1
Release Date: 2024-12-12T08:10:17Z
Rating: moderate
References:
* bsc#1233856
Cross-References:
* CVE-2024-21538
CVSS scores:
* CVE-2024-21538 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-21538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-21538 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* Web and Scripting Module 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for nodejs20 fixes the following issues:
* CVE-2024-21538: Fixed regular expression denial of service in cross-spawn
dependency (bsc#1233856)
Other fixes: \- Updated to 20.18.1: * Experimental Network Inspection Support in
Node.js * Exposes X509_V_FLAG_PARTIAL_CHAIN to tls.createSecureContext * New
option for vm.createContext() to create a context with a freezable globalThis *
buffer: optimize createFromString \- Changes in 20.17.0: * module: support
require()ing synchronous ESM graphs * path: add matchesGlob method * stream:
expose DuplexPair API \- Changes in 20.16.0: * process: add
process.getBuiltinModule(id) * inspector: fix disable async hooks on
Debugger.setAsyncCallStackDepth * buffer: add .bytes() method to Blob
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4300=1 SUSE-2024-4300=1
* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-4300=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* npm20-20.18.1-150500.11.15.1
* nodejs20-debugsource-20.18.1-150500.11.15.1
* nodejs20-20.18.1-150500.11.15.1
* nodejs20-debuginfo-20.18.1-150500.11.15.1
* nodejs20-devel-20.18.1-150500.11.15.1
* corepack20-20.18.1-150500.11.15.1
* openSUSE Leap 15.5 (noarch)
* nodejs20-docs-20.18.1-150500.11.15.1
* Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* npm20-20.18.1-150500.11.15.1
* nodejs20-debugsource-20.18.1-150500.11.15.1
* nodejs20-20.18.1-150500.11.15.1
* nodejs20-debuginfo-20.18.1-150500.11.15.1
* nodejs20-devel-20.18.1-150500.11.15.1
* Web and Scripting Module 15-SP5 (noarch)
* nodejs20-docs-20.18.1-150500.11.15.1
## References:
* https://www.suse.com/security/cve/CVE-2024-21538.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233856
1
0
12 Dec '24
# Security update for nodejs18
Announcement ID: SUSE-SU-2024:4301-1
Release Date: 2024-12-12T08:10:45Z
Rating: moderate
References:
* bsc#1233856
Cross-References:
* CVE-2024-21538
CVSS scores:
* CVE-2024-21538 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-21538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-21538 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* Web and Scripting Module 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for nodejs18 fixes the following issues:
* CVE-2024-21538: Fixed regular expression denial of service in cross-spawn
dependency (bsc#1233856)
Other fixes: \- Update to 18.20.5 * esm: mark import attributes and JSON module
as stable * deps: \+ upgrade npm to 10.8.2 \+ update simdutf to 5.6.0 \+ update
brotli to 1.1.0 \+ update ada to 2.8.0 \+ update acorn to 8.13.0 \+ update
acorn-walk to 8.3.4 \+ update c-ares to 1.29.0
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4301=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4301=1
* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-4301=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* corepack18-18.20.5-150400.9.30.1
* nodejs18-devel-18.20.5-150400.9.30.1
* nodejs18-debugsource-18.20.5-150400.9.30.1
* npm18-18.20.5-150400.9.30.1
* nodejs18-debuginfo-18.20.5-150400.9.30.1
* nodejs18-18.20.5-150400.9.30.1
* openSUSE Leap 15.4 (noarch)
* nodejs18-docs-18.20.5-150400.9.30.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* corepack18-18.20.5-150400.9.30.1
* nodejs18-devel-18.20.5-150400.9.30.1
* nodejs18-debugsource-18.20.5-150400.9.30.1
* npm18-18.20.5-150400.9.30.1
* nodejs18-debuginfo-18.20.5-150400.9.30.1
* nodejs18-18.20.5-150400.9.30.1
* openSUSE Leap 15.5 (noarch)
* nodejs18-docs-18.20.5-150400.9.30.1
* Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* nodejs18-debugsource-18.20.5-150400.9.30.1
* nodejs18-devel-18.20.5-150400.9.30.1
* npm18-18.20.5-150400.9.30.1
* nodejs18-debuginfo-18.20.5-150400.9.30.1
* nodejs18-18.20.5-150400.9.30.1
* Web and Scripting Module 15-SP5 (noarch)
* nodejs18-docs-18.20.5-150400.9.30.1
## References:
* https://www.suse.com/security/cve/CVE-2024-21538.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233856
1
0
# Security update for socat
Announcement ID: SUSE-SU-2024:4302-1
Release Date: 2024-12-12T08:51:18Z
Rating: moderate
References:
* bsc#1225462
Cross-References:
* CVE-2024-54661
CVSS scores:
* CVE-2024-54661 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-54661 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for socat fixes the following issues:
* CVE-2024-54661: Fixed arbitrary file overwrite via predictable /tmp
directory (bsc#1225462)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4302=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4302=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4302=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4302=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4302=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4302=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4302=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4302=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4302=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* socat-extra-1.8.0.0-150400.14.6.1
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* socat-1.8.0.0-150400.14.6.1
* socat-debugsource-1.8.0.0-150400.14.6.1
* socat-debuginfo-1.8.0.0-150400.14.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-54661.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225462
1
0
# Security update for socat
Announcement ID: SUSE-SU-2024:4295-1
Release Date: 2024-12-11T14:41:01Z
Rating: moderate
References:
* bsc#1225462
Cross-References:
* CVE-2024-54661
CVSS scores:
* CVE-2024-54661 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-54661 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for socat fixes the following issues:
* CVE-2024-54661: Fixed arbitrary file overwrite via predictable /tmp
directory in socat readline.sh (bsc#1225462)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4295=1 openSUSE-SLE-15.6-2024-4295=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4295=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* socat-extra-1.8.0.0-150600.20.6.1
* socat-1.8.0.0-150600.20.6.1
* socat-debugsource-1.8.0.0-150600.20.6.1
* socat-debuginfo-1.8.0.0-150600.20.6.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* socat-1.8.0.0-150600.20.6.1
* socat-debugsource-1.8.0.0-150600.20.6.1
* socat-debuginfo-1.8.0.0-150600.20.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-54661.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225462
1
0
openSUSE-RU-2024:0403-1: moderate: Recommended update for kanidm
by maintenanceďĽ opensuse.org 11 Dec '24
by maintenanceďĽ opensuse.org 11 Dec '24
11 Dec '24
openSUSE Recommended Update: Recommended update for kanidm
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0403-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for kanidm fixes the following issues:
Update to version 1.4.4~git0.c3dbf83:
- Check DNS on replication loop start not at task start (#3243)
- Work around systemd race condition (#3262)
- Clear invalid tokens from unix resolver (#3256)
- Allow OAuth2 loopback redirects if the path matches (#3252)
- Correctly display domain name on login (#3254)
- Display account_id during success/deny paths in unixd (#3253)
- s/idm_people_self_write_mail/idm_people_self_mail_write/g (#3250)
- handle missing map_group setting in config (#3242)
- owncloud: Add SameSite=Lax config for cross-domain auth (#3245)
- Yaleman/issue3229 (#3239)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-403=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 x86_64):
kanidm-1.4.4~git0.c3dbf83-bp156.13.1
kanidm-clients-1.4.4~git0.c3dbf83-bp156.13.1
kanidm-docs-1.4.4~git0.c3dbf83-bp156.13.1
kanidm-server-1.4.4~git0.c3dbf83-bp156.13.1
kanidm-unixd-clients-1.4.4~git0.c3dbf83-bp156.13.1
References:
1
0
11 Dec '24
# Security update for python-Django
Announcement ID: SUSE-SU-2024:4285-1
Release Date: 2024-12-11T08:30:27Z
Rating: critical
References:
* bsc#1234231
* bsc#1234232
Cross-References:
* CVE-2024-53907
* CVE-2024-53908
CVSS scores:
* CVE-2024-53907 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53907 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53908 ( SUSE ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-53908 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for python-Django fixes the following issues:
* CVE-2024-53907: Fixed denial-of-service in django.utils.html.strip_tags()
(bsc#1234232)
* CVE-2024-53908: Fixed SQL injection in HasKey(lhs, rhs) on Oracle
(bsc#1234231)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4285=1 openSUSE-SLE-15.6-2024-4285=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4285=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* python311-Django-4.2.11-150600.3.12.1
* SUSE Package Hub 15 15-SP6 (noarch)
* python311-Django-4.2.11-150600.3.12.1
## References:
* https://www.suse.com/security/cve/CVE-2024-53907.html
* https://www.suse.com/security/cve/CVE-2024-53908.html
* https://bugzilla.suse.com/show_bug.cgi?id=1234231
* https://bugzilla.suse.com/show_bug.cgi?id=1234232
1
0
11 Dec '24
# Security update for nodejs20
Announcement ID: SUSE-SU-2024:4286-1
Release Date: 2024-12-11T08:30:46Z
Rating: moderate
References:
* bsc#1233856
Cross-References:
* CVE-2024-21538
CVSS scores:
* CVE-2024-21538 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-21538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-21538 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* Web and Scripting Module 15-SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for nodejs20 fixes the following issues:
* CVE-2024-21538: Fixed regular expression denial of service in cross-spawn
dependency (bsc#1233856)
Other fixes: \- Updated to 20.18.1: * Experimental Network Inspection Support in
Node.js * Exposes X509_V_FLAG_PARTIAL_CHAIN to tls.createSecureContext * New
option for vm.createContext() to create a context with a freezable globalThis *
buffer: optimize createFromString \- Changes in 20.17.0: * module: support
require()ing synchronous ESM graphs * path: add matchesGlob method * stream:
expose DuplexPair API \- Changes in 20.16.0: * process: add
process.getBuiltinModule(id) * inspector: fix disable async hooks on
Debugger.setAsyncCallStackDepth * buffer: add .bytes() method to Blob
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4286=1 openSUSE-SLE-15.6-2024-4286=1
* Web and Scripting Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2024-4286=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* nodejs20-debugsource-20.18.1-150600.3.6.1
* nodejs20-devel-20.18.1-150600.3.6.1
* nodejs20-20.18.1-150600.3.6.1
* nodejs20-debuginfo-20.18.1-150600.3.6.1
* corepack20-20.18.1-150600.3.6.1
* npm20-20.18.1-150600.3.6.1
* openSUSE Leap 15.6 (noarch)
* nodejs20-docs-20.18.1-150600.3.6.1
* Web and Scripting Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* nodejs20-debugsource-20.18.1-150600.3.6.1
* nodejs20-devel-20.18.1-150600.3.6.1
* nodejs20-20.18.1-150600.3.6.1
* nodejs20-debuginfo-20.18.1-150600.3.6.1
* npm20-20.18.1-150600.3.6.1
* Web and Scripting Module 15-SP6 (noarch)
* nodejs20-docs-20.18.1-150600.3.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-21538.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233856
1
0
# Security update for curl
Announcement ID: SUSE-SU-2024:4288-1
Release Date: 2024-12-11T08:31:36Z
Rating: moderate
References:
* bsc#1234068
Cross-References:
* CVE-2024-11053
CVSS scores:
* CVE-2024-11053 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for curl fixes the following issues:
* CVE-2024-11053: Fixed password leak used for the first host to the followed-
to host under certain circumstances (bsc#1234068)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4288=1 openSUSE-SLE-15.6-2024-4288=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4288=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* curl-8.6.0-150600.4.15.1
* libcurl-devel-8.6.0-150600.4.15.1
* libcurl4-debuginfo-8.6.0-150600.4.15.1
* libcurl4-8.6.0-150600.4.15.1
* curl-debuginfo-8.6.0-150600.4.15.1
* curl-debugsource-8.6.0-150600.4.15.1
* openSUSE Leap 15.6 (x86_64)
* libcurl4-32bit-8.6.0-150600.4.15.1
* libcurl-devel-32bit-8.6.0-150600.4.15.1
* libcurl4-32bit-debuginfo-8.6.0-150600.4.15.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libcurl4-64bit-debuginfo-8.6.0-150600.4.15.1
* libcurl4-64bit-8.6.0-150600.4.15.1
* libcurl-devel-64bit-8.6.0-150600.4.15.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* curl-8.6.0-150600.4.15.1
* libcurl-devel-8.6.0-150600.4.15.1
* libcurl4-debuginfo-8.6.0-150600.4.15.1
* libcurl4-8.6.0-150600.4.15.1
* curl-debuginfo-8.6.0-150600.4.15.1
* curl-debugsource-8.6.0-150600.4.15.1
* Basesystem Module 15-SP6 (x86_64)
* libcurl4-32bit-8.6.0-150600.4.15.1
* libcurl4-32bit-debuginfo-8.6.0-150600.4.15.1
## References:
* https://www.suse.com/security/cve/CVE-2024-11053.html
* https://bugzilla.suse.com/show_bug.cgi?id=1234068
1
0
SUSE-RU-2024:4289-1: moderate: Recommended update for python-rpm-macros
by OPENSUSE-UPDATES 11 Dec '24
by OPENSUSE-UPDATES 11 Dec '24
11 Dec '24
# Recommended update for python-rpm-macros
Announcement ID: SUSE-RU-2024:4289-1
Release Date: 2024-12-11T09:47:57Z
Rating: moderate
References:
* bsc#1233151
* bsc#1233774
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has two fixes can now be installed.
## Description:
This update for python-rpm-macros fixes the following issue:
* Update to version 20241120 (bsc#1233151)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4289=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4289=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4289=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4289=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4289=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4289=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4289=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4289=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4289=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4289=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4289=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4289=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4289=1
## Package List:
* Basesystem Module 15-SP5 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* Basesystem Module 15-SP6 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* SUSE Manager Proxy 4.3 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* SUSE Manager Server 4.3 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* openSUSE Leap 15.4 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* openSUSE Leap 15.5 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
* openSUSE Leap 15.6 (noarch)
* python-rpm-macros-20241120.6ae645f-150400.3.18.1
* python-rpm-generators-20241120.6ae645f-150400.3.18.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1233151
* https://bugzilla.suse.com/show_bug.cgi?id=1233774
1
0
11 Dec '24
# Security update for libsoup2
Announcement ID: SUSE-SU-2024:4290-1
Release Date: 2024-12-11T11:10:48Z
Rating: important
References:
* bsc#1233285
* bsc#1233287
* bsc#1233292
Cross-References:
* CVE-2024-52530
* CVE-2024-52531
* CVE-2024-52532
CVSS scores:
* CVE-2024-52530 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-52530 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-52530 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-52531 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-52531 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-52531 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-52532 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-52532 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-52532 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for libsoup2 fixes the following issues:
* CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from
the ends of header names (bsc#1233285)
* CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in
soup_header_parse_param_list_strict (bsc#1233292)
* CVE-2024-52532: Fixed infinite loop while reading websocket data
(bsc#1233287)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4290=1 openSUSE-SLE-15.6-2024-4290=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4290=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.3.1
* libsoup-2_4-1-2.74.3-150600.4.3.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.3.1
* libsoup2-debugsource-2.74.3-150600.4.3.1
* libsoup2-devel-2.74.3-150600.4.3.1
* openSUSE Leap 15.6 (x86_64)
* libsoup2-devel-32bit-2.74.3-150600.4.3.1
* libsoup-2_4-1-32bit-debuginfo-2.74.3-150600.4.3.1
* libsoup-2_4-1-32bit-2.74.3-150600.4.3.1
* openSUSE Leap 15.6 (noarch)
* libsoup2-lang-2.74.3-150600.4.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libsoup-2_4-1-64bit-2.74.3-150600.4.3.1
* libsoup-2_4-1-64bit-debuginfo-2.74.3-150600.4.3.1
* libsoup2-devel-64bit-2.74.3-150600.4.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.3.1
* libsoup-2_4-1-2.74.3-150600.4.3.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.3.1
* libsoup2-debugsource-2.74.3-150600.4.3.1
* libsoup2-devel-2.74.3-150600.4.3.1
* Basesystem Module 15-SP6 (noarch)
* libsoup2-lang-2.74.3-150600.4.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-52530.html
* https://www.suse.com/security/cve/CVE-2024-52531.html
* https://www.suse.com/security/cve/CVE-2024-52532.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233285
* https://bugzilla.suse.com/show_bug.cgi?id=1233287
* https://bugzilla.suse.com/show_bug.cgi?id=1233292
1
0
11 Dec '24
# Security update for python312
Announcement ID: SUSE-SU-2024:4291-1
Release Date: 2024-12-11T11:24:51Z
Rating: important
References:
* bsc#1231795
* bsc#1234290
Cross-References:
* CVE-2024-12254
CVSS scores:
* CVE-2024-12254 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2024-12254 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-12254 ( NVD ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* openSUSE Leap 15.6
* Python 3 Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for python312 fixes the following issues:
* CVE-2024-12254: Fixed unbounded memory buffering in
SelectorSocketTransport.writelines() (bsc#1234290)
Other fixes: \- Updated to version 3.12.8 \- Remove -IVendor/ from python-config
(bsc#1231795)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4291=1 openSUSE-SLE-15.6-2024-4291=1
* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-4291=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* python312-doc-devhelp-3.12.8-150600.3.12.1
* python312-tools-3.12.8-150600.3.12.1
* libpython3_12-1_0-debuginfo-3.12.8-150600.3.12.1
* python312-dbm-debuginfo-3.12.8-150600.3.12.1
* python312-tk-3.12.8-150600.3.12.1
* python312-idle-3.12.8-150600.3.12.1
* python312-base-3.12.8-150600.3.12.1
* python312-curses-3.12.8-150600.3.12.1
* python312-testsuite-debuginfo-3.12.8-150600.3.12.1
* python312-debugsource-3.12.8-150600.3.12.1
* libpython3_12-1_0-3.12.8-150600.3.12.1
* python312-tk-debuginfo-3.12.8-150600.3.12.1
* python312-testsuite-3.12.8-150600.3.12.1
* python312-3.12.8-150600.3.12.1
* python312-curses-debuginfo-3.12.8-150600.3.12.1
* python312-doc-3.12.8-150600.3.12.1
* python312-base-debuginfo-3.12.8-150600.3.12.1
* python312-dbm-3.12.8-150600.3.12.1
* python312-debuginfo-3.12.8-150600.3.12.1
* python312-devel-3.12.8-150600.3.12.1
* python312-core-debugsource-3.12.8-150600.3.12.1
* openSUSE Leap 15.6 (x86_64)
* python312-32bit-3.12.8-150600.3.12.1
* libpython3_12-1_0-32bit-debuginfo-3.12.8-150600.3.12.1
* libpython3_12-1_0-32bit-3.12.8-150600.3.12.1
* python312-base-32bit-debuginfo-3.12.8-150600.3.12.1
* python312-32bit-debuginfo-3.12.8-150600.3.12.1
* python312-base-32bit-3.12.8-150600.3.12.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* python312-64bit-debuginfo-3.12.8-150600.3.12.1
* libpython3_12-1_0-64bit-debuginfo-3.12.8-150600.3.12.1
* python312-64bit-3.12.8-150600.3.12.1
* python312-base-64bit-3.12.8-150600.3.12.1
* python312-base-64bit-debuginfo-3.12.8-150600.3.12.1
* libpython3_12-1_0-64bit-3.12.8-150600.3.12.1
* Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python312-dbm-debuginfo-3.12.8-150600.3.12.1
* python312-tk-debuginfo-3.12.8-150600.3.12.1
* python312-3.12.8-150600.3.12.1
* python312-curses-debuginfo-3.12.8-150600.3.12.1
* python312-debugsource-3.12.8-150600.3.12.1
* python312-tools-3.12.8-150600.3.12.1
* python312-tk-3.12.8-150600.3.12.1
* python312-devel-3.12.8-150600.3.12.1
* python312-curses-3.12.8-150600.3.12.1
* python312-base-debuginfo-3.12.8-150600.3.12.1
* libpython3_12-1_0-3.12.8-150600.3.12.1
* python312-idle-3.12.8-150600.3.12.1
* python312-dbm-3.12.8-150600.3.12.1
* python312-debuginfo-3.12.8-150600.3.12.1
* python312-core-debugsource-3.12.8-150600.3.12.1
* python312-base-3.12.8-150600.3.12.1
* libpython3_12-1_0-debuginfo-3.12.8-150600.3.12.1
## References:
* https://www.suse.com/security/cve/CVE-2024-12254.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231795
* https://bugzilla.suse.com/show_bug.cgi?id=1234290
1
0
11 Dec '24
# Security update for webkit2gtk3
Announcement ID: SUSE-SU-2024:4292-1
Release Date: 2024-12-11T11:41:37Z
Rating: important
References:
* bsc#1233631
* bsc#1233632
Cross-References:
* CVE-2024-44308
* CVE-2024-44309
CVSS scores:
* CVE-2024-44308 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-44308 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-44308 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-44309 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2024-44309 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2024-44309 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products:
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP6
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for webkit2gtk3 fixes the following issues:
* CVE-2024-44308: Fixed processing maliciously crafted web content that may
lead to arbitrary code execution (bsc#1233631)
* CVE-2024-44309: Fixed data isolation bypass vulnerability (bsc#1233632)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4292=1 openSUSE-SLE-15.6-2024-4292=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4292=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4292=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4292=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* WebKitGTK-6.0-lang-2.46.3-150600.12.21.1
* WebKitGTK-4.0-lang-2.46.3-150600.12.21.1
* WebKitGTK-4.1-lang-2.46.3-150600.12.21.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* webkit2gtk3-soup2-devel-2.46.3-150600.12.21.1
* libwebkitgtk-6_0-4-debuginfo-2.46.3-150600.12.21.1
* typelib-1_0-WebKit2WebExtension-4_1-2.46.3-150600.12.21.1
* webkit2gtk4-minibrowser-2.46.3-150600.12.21.1
* typelib-1_0-WebKitWebProcessExtension-6_0-2.46.3-150600.12.21.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.46.3-150600.12.21.1
* webkit2gtk-4_0-injected-bundles-2.46.3-150600.12.21.1
* webkitgtk-6_0-injected-bundles-debuginfo-2.46.3-150600.12.21.1
* typelib-1_0-WebKit2-4_0-2.46.3-150600.12.21.1
* webkit-jsc-4.1-2.46.3-150600.12.21.1
* webkit2gtk4-devel-2.46.3-150600.12.21.1
* webkit-jsc-4-debuginfo-2.46.3-150600.12.21.1
* webkit2gtk3-soup2-minibrowser-2.46.3-150600.12.21.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.46.3-150600.12.21.1
* libwebkit2gtk-4_1-0-debuginfo-2.46.3-150600.12.21.1
* webkit-jsc-4.1-debuginfo-2.46.3-150600.12.21.1
* webkit-jsc-6.0-2.46.3-150600.12.21.1
* webkit-jsc-4-2.46.3-150600.12.21.1
* webkit2gtk3-soup2-debugsource-2.46.3-150600.12.21.1
* typelib-1_0-JavaScriptCore-6_0-2.46.3-150600.12.21.1
* typelib-1_0-WebKit2WebExtension-4_0-2.46.3-150600.12.21.1
* libwebkit2gtk-4_0-37-2.46.3-150600.12.21.1
* webkit2gtk3-minibrowser-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-150600.12.21.1
* webkit-jsc-6.0-debuginfo-2.46.3-150600.12.21.1
* typelib-1_0-JavaScriptCore-4_1-2.46.3-150600.12.21.1
* webkit2gtk-4_1-injected-bundles-2.46.3-150600.12.21.1
* libjavascriptcoregtk-6_0-1-2.46.3-150600.12.21.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-150600.12.21.1
* webkit2gtk3-devel-2.46.3-150600.12.21.1
* webkit2gtk4-debugsource-2.46.3-150600.12.21.1
* webkit2gtk4-minibrowser-debuginfo-2.46.3-150600.12.21.1
* typelib-1_0-WebKit-6_0-2.46.3-150600.12.21.1
* libwebkitgtk-6_0-4-2.46.3-150600.12.21.1
* webkit2gtk3-minibrowser-2.46.3-150600.12.21.1
* typelib-1_0-JavaScriptCore-4_0-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_1-0-2.46.3-150600.12.21.1
* webkitgtk-6_0-injected-bundles-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_0-18-2.46.3-150600.12.21.1
* libwebkit2gtk-4_0-37-debuginfo-2.46.3-150600.12.21.1
* typelib-1_0-WebKit2-4_1-2.46.3-150600.12.21.1
* webkit2gtk3-soup2-minibrowser-debuginfo-2.46.3-150600.12.21.1
* libwebkit2gtk-4_1-0-2.46.3-150600.12.21.1
* webkit2gtk3-debugsource-2.46.3-150600.12.21.1
* openSUSE Leap 15.6 (x86_64)
* libwebkit2gtk-4_0-37-32bit-2.46.3-150600.12.21.1
* libwebkit2gtk-4_1-0-32bit-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.46.3-150600.12.21.1
* libwebkit2gtk-4_0-37-32bit-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_0-18-32bit-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_1-0-32bit-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.46.3-150600.12.21.1
* libwebkit2gtk-4_1-0-32bit-2.46.3-150600.12.21.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.46.3-150600.12.21.1
* libwebkit2gtk-4_1-0-64bit-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_0-18-64bit-2.46.3-150600.12.21.1
* libwebkit2gtk-4_0-37-64bit-2.46.3-150600.12.21.1
* libwebkit2gtk-4_1-0-64bit-debuginfo-2.46.3-150600.12.21.1
* libwebkit2gtk-4_0-37-64bit-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_1-0-64bit-2.46.3-150600.12.21.1
* Basesystem Module 15-SP6 (noarch)
* WebKitGTK-4.0-lang-2.46.3-150600.12.21.1
* WebKitGTK-6.0-lang-2.46.3-150600.12.21.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* webkit2gtk-4_0-injected-bundles-2.46.3-150600.12.21.1
* webkit2gtk3-soup2-devel-2.46.3-150600.12.21.1
* webkitgtk-6_0-injected-bundles-debuginfo-2.46.3-150600.12.21.1
* typelib-1_0-WebKit2-4_0-2.46.3-150600.12.21.1
* libwebkitgtk-6_0-4-2.46.3-150600.12.21.1
* libwebkitgtk-6_0-4-debuginfo-2.46.3-150600.12.21.1
* typelib-1_0-JavaScriptCore-4_0-2.46.3-150600.12.21.1
* webkit2gtk3-soup2-debugsource-2.46.3-150600.12.21.1
* webkitgtk-6_0-injected-bundles-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_0-18-2.46.3-150600.12.21.1
* typelib-1_0-WebKit2WebExtension-4_0-2.46.3-150600.12.21.1
* libwebkit2gtk-4_0-37-2.46.3-150600.12.21.1
* libwebkit2gtk-4_0-37-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.46.3-150600.12.21.1
* libjavascriptcoregtk-6_0-1-2.46.3-150600.12.21.1
* webkit2gtk4-debugsource-2.46.3-150600.12.21.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.46.3-150600.12.21.1
* Desktop Applications Module 15-SP6 (noarch)
* WebKitGTK-4.1-lang-2.46.3-150600.12.21.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* webkit2gtk3-devel-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_1-0-2.46.3-150600.12.21.1
* typelib-1_0-WebKit2WebExtension-4_1-2.46.3-150600.12.21.1
* typelib-1_0-WebKit2-4_1-2.46.3-150600.12.21.1
* webkit2gtk3-debugsource-2.46.3-150600.12.21.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.46.3-150600.12.21.1
* libwebkit2gtk-4_1-0-debuginfo-2.46.3-150600.12.21.1
* webkit2gtk-4_1-injected-bundles-2.46.3-150600.12.21.1
* libwebkit2gtk-4_1-0-2.46.3-150600.12.21.1
* typelib-1_0-JavaScriptCore-4_1-2.46.3-150600.12.21.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.46.3-150600.12.21.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* typelib-1_0-WebKit-6_0-2.46.3-150600.12.21.1
* typelib-1_0-JavaScriptCore-6_0-2.46.3-150600.12.21.1
* webkit2gtk4-devel-2.46.3-150600.12.21.1
* typelib-1_0-WebKitWebProcessExtension-6_0-2.46.3-150600.12.21.1
* webkit2gtk4-debugsource-2.46.3-150600.12.21.1
## References:
* https://www.suse.com/security/cve/CVE-2024-44308.html
* https://www.suse.com/security/cve/CVE-2024-44309.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233631
* https://bugzilla.suse.com/show_bug.cgi?id=1233632
1
0
10 Dec '24
# Recommended update for guava
Announcement ID: SUSE-RU-2024:4280-1
Release Date: 2024-12-10T16:00:36Z
Rating: moderate
References:
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Server 4.3
* SUSE Manager Server 4.3 Module
An update that can now be installed.
## Description:
This update for guava, google-errorprone, checker-qual, j2objc-annotations fixes
the following issues:
guava was updated from version 33.1.0 to 33.2.1:
* Added some artifact aliases
* Changed how internet addresses are handled to preserve more information.
This might require code updates if you were relying on the old behavior
(consult the package changelog for more details).
* Fixed a compilation issue under Gradle.
* Fixed a potential crash when building ImmutableMap.
* Added new constants for HTTP headers (Ad-Auction-Allowed, Permissions-
Policy-Report-Only, and Sec-GPC).
google-errorprone, checker-qual, j2objc-annotations:
* google-errorprone-annotations, checker-qual, j2objc-annotations were added
to the Development Tools Module as they are required by this guava update
* google-errorprone-annotations package was updated from version 2.11.0 to
2.26.1 on SUSE Linux Enterprise 15 LTSS products, as it's required by this
guava update:
* Added new checks for common Java coding errors
* Improvement of existing checks
* Performance and infrastructure improvements
* Various bugs were fixed
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4280=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4280=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4280=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4280=1
* SUSE Manager Server 4.3 Module
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-4280=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4280=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4280=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4280=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4280=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4280=1
* SUSE Linux Enterprise Server 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4280=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4280=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4280=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4280=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4280=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4280=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4280=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* j2objc-annotations-javadoc-2.2-150200.5.5.2
* j2objc-annotations-2.2-150200.5.5.2
* google-errorprone-annotation-2.26.1-150200.5.8.1
* google-errorprone-type_annotations-2.26.1-150200.5.8.1
* guava-33.2.1-150200.3.13.2
* google-errorprone-docgen_processor-2.26.1-150200.5.8.1
* google-errorprone-parent-2.26.1-150200.5.8.1
* checker-qual-javadoc-3.22.0-150200.5.7.2
* checker-qual-3.22.0-150200.5.7.2
* guava-javadoc-33.2.1-150200.3.13.2
* google-errorprone-javadoc-2.26.1-150200.5.8.1
* google-errorprone-annotations-javadoc-2.26.1-150200.5.8.1
* google-errorprone-annotations-2.26.1-150200.5.8.1
* guava-testlib-33.2.1-150200.3.13.2
* openSUSE Leap 15.6 (noarch)
* j2objc-annotations-javadoc-2.2-150200.5.5.2
* j2objc-annotations-2.2-150200.5.5.2
* google-errorprone-annotation-2.26.1-150200.5.8.1
* google-errorprone-type_annotations-2.26.1-150200.5.8.1
* guava-33.2.1-150200.3.13.2
* google-errorprone-docgen_processor-2.26.1-150200.5.8.1
* google-errorprone-parent-2.26.1-150200.5.8.1
* checker-qual-javadoc-3.22.0-150200.5.7.2
* checker-qual-3.22.0-150200.5.7.2
* guava-javadoc-33.2.1-150200.3.13.2
* google-errorprone-javadoc-2.26.1-150200.5.8.1
* google-errorprone-annotations-javadoc-2.26.1-150200.5.8.1
* google-errorprone-annotations-2.26.1-150200.5.8.1
* guava-testlib-33.2.1-150200.3.13.2
* Development Tools Module 15-SP5 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* Development Tools Module 15-SP6 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Manager Server 4.3 Module (noarch)
* google-errorprone-annotations-2.26.1-150200.5.8.1
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise Server 15 SP2 LTSS (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
* SUSE Enterprise Storage 7.1 (noarch)
* guava-33.2.1-150200.3.13.2
* google-errorprone-annotations-2.26.1-150200.5.8.1
* checker-qual-3.22.0-150200.5.7.2
* j2objc-annotations-2.2-150200.5.5.2
1
0
# Optional update for fuse3
Announcement ID: SUSE-OU-2024:4281-1
Release Date: 2024-12-10T16:02:11Z
Rating: moderate
References:
* jsc#MSC-894
* jsc#PED-10732
* jsc#PED-11018
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that contains three features can now be installed.
## Description:
This update for fuse3 provides missing -devel packages for SLE 15 SP4.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4281=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4281=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4281=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4281=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4281=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4281=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4281=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4281=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4281=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4281=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4281=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4281=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4281=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4281=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-4281=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4281=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4281=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4281=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4281=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* fuse3-doc-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* openSUSE Leap 15.6 (x86_64)
* libfuse3-3-32bit-3.10.5-150400.3.2.1
* libfuse3-3-32bit-debuginfo-3.10.5-150400.3.2.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* SUSE Manager Proxy 4.3 (x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* fuse3-doc-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* openSUSE Leap 15.4 (x86_64)
* libfuse3-3-32bit-3.10.5-150400.3.2.1
* libfuse3-3-32bit-debuginfo-3.10.5-150400.3.2.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libfuse3-3-64bit-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-64bit-3.10.5-150400.3.2.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libfuse3-3-debuginfo-3.10.5-150400.3.2.1
* fuse3-devel-3.10.5-150400.3.2.1
* fuse3-doc-3.10.5-150400.3.2.1
* libfuse3-3-3.10.5-150400.3.2.1
* fuse3-debuginfo-3.10.5-150400.3.2.1
* fuse3-debugsource-3.10.5-150400.3.2.1
* fuse3-3.10.5-150400.3.2.1
* openSUSE Leap 15.5 (x86_64)
* libfuse3-3-32bit-3.10.5-150400.3.2.1
* libfuse3-3-32bit-debuginfo-3.10.5-150400.3.2.1
## References:
* https://jira.suse.com/browse/MSC-894
* https://jira.suse.com/browse/PED-10732
* https://jira.suse.com/browse/PED-11018
1
0
SUSE-RU-2024:4279-1: moderate: Recommended update for nvidia-open-driver-G06-signed
by OPENSUSE-UPDATES 10 Dec '24
by OPENSUSE-UPDATES 10 Dec '24
10 Dec '24
# Recommended update for nvidia-open-driver-G06-signed
Announcement ID: SUSE-RU-2024:4279-1
Release Date: 2024-12-10T15:16:37Z
Rating: moderate
References:
* bsc#1229716
* bsc#1230368
* bsc#1230779
* bsc#1232057
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has four fixes can now be installed.
## Description:
This update for nvidia-open-driver-G06-signed fixes the following issues:
Update to 550.127.05 (boo#1232057)
* Fixed a bug which could cause applications using GBM to crash when running
with nvidia-drm.modeset=0.
* cuda-flavor
provide also nvidia-open-driver-G06-kmp-$flavor = %version to workaround broken
cuda-drivers
* For CUDA update version to 560.35.03
* cuda-flavor
* provide nvidia-open-driver-G06-kmp = %version to workaround broken cuda-
drivers
* nv-prefer-signed-open-driver
* added comments for requirements
* latest change hardcoded to 555.42.06; we no longer need this for 560
* nv-prefer-signed-open-driver:
* added specicic versions of cuda-drivers/cuda-drivers-xxx as preconditions
for requiring specific version of nvidia-compute-G06
* nv-prefer-signed-open-driver:
* no longer require a specific version of nvidia-open-driver-G06-signed-cuda-
kmp, so it can select the correct open driver KMP matching the cuda-runtime
version
* cuda-flavor:
* added nvidia-compute-G06 = %version to preconditions for requiring kernel-
firmware-nvidia-gspx-G06, since nvidia-compute-utils-G06 does not have a
version-specific requires on nvidia-compute-G06
* cuda-flavor:
* require kernel-firmware-nvidia-gspx-G06 instead of kernel-firmware-nvidia-
gspx-G06-cuda (which provides also kernel-firmware-nvidia-gspx-G06)
* trigger removal of driver modules also on kernel-firmware-nvidia-gspx-G06
* no longer hard-require kernel firmware package, but install it automatically
once nvidia-compute-utils-G06 gets installed
* trigger removal of driver modules with non-existing or wrong firmware when
(new) firmware gets installed
* Update to 550.120 (bsc#1230779)
* Fixed a bug that could cause kernel crashes upon attempting KMS operations
through DRM when nvidia_drm was loaded with modeset=0.
* CUDA build: removed entries from pci_ids-555.42.06 since this is doing more
harm than benefit (bsc#1230368)
* For CUDA (preamble file):
* added: Provides: nvidia-open-driver-G06-signed-cuda-kmp-$flavor = %version
which is needed for 'zypper install <package> = <version>'
* added: Provides/Conflicts: nvidia-open-driver-G06-signed-kmp-$flavor =
%version useful for containers
* reverted CUDA update version to 560.x.y due to changes in CUDA repository
with CUDA 12.6/560.x.y drivers
* For CUDA update version to 560.35.03
* Update to 550.107.02 (bsc#1229716)
* For CUDA update version to 560.28.03
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4279=1 SUSE-2024-4279=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4279=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4279=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4279=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-4279=1
## Package List:
* openSUSE Leap 15.5 (x86_64)
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.135_k5.14.21_150500.31-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-azure-565.57.01_k5.14.21_150500.31-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-azure-550.135_k5.14.21_150500.31-150500.3.61.1
* nvidia-open-driver-G06-signed-azure-devel-550.135-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-azure-debuginfo-565.57.01_k5.14.21_150500.31-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-azure-devel-565.57.01-150500.3.61.1
* openSUSE Leap 15.5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150500.53-150500.3.61.1
* nv-prefer-signed-open-driver-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150500.53-150500.3.61.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150500.3.61.1
* openSUSE Leap 15.5 (aarch64)
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-565.57.01_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-64kb-devel-550.135-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.135_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.135_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-565.57.01_k5.14.21_150500.53-150500.3.61.1
* openSUSE Leap Micro 5.5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150500.53-150500.3.61.1
* nv-prefer-signed-open-driver-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150500.53-150500.3.61.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150500.3.61.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-debugsource-550.135-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150500.53-150500.3.61.1
* nv-prefer-signed-open-driver-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150500.53-150500.3.61.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150500.53-150500.3.61.1
* Basesystem Module 15-SP5 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-default-devel-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-debugsource-550.135-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.135_k5.14.21_150500.53-150500.3.61.1
* nv-prefer-signed-open-driver-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-565.57.01_k5.14.21_150500.53-150500.3.61.1
* kernel-firmware-nvidia-gspx-G06-cuda-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-debugsource-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-default-550.135_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-565.57.01_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-default-devel-550.135-150500.3.61.1
* Basesystem Module 15-SP5 (aarch64)
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-565.57.01_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-64kb-devel-550.135-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-64kb-550.135_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-565.57.01-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.135_k5.14.21_150500.53-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-565.57.01_k5.14.21_150500.53-150500.3.61.1
* Public Cloud Module 15-SP5 (x86_64)
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.135_k5.14.21_150500.31-150500.3.61.1
* nvidia-open-driver-G06-signed-kmp-azure-550.135_k5.14.21_150500.31-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-azure-565.57.01_k5.14.21_150500.31-150500.3.61.1
* nvidia-open-driver-G06-signed-azure-devel-550.135-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-kmp-azure-debuginfo-565.57.01_k5.14.21_150500.31-150500.3.61.1
* nvidia-open-driver-G06-signed-cuda-azure-devel-565.57.01-150500.3.61.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229716
* https://bugzilla.suse.com/show_bug.cgi?id=1230368
* https://bugzilla.suse.com/show_bug.cgi?id=1230779
* https://bugzilla.suse.com/show_bug.cgi?id=1232057
1
0
10 Dec '24
# Feature update for python-pyvmomi
Announcement ID: SUSE-FU-2024:4271-1
Release Date: 2024-12-10T08:25:21Z
Rating: moderate
References:
* jsc#PED-11464
* jsc#PED-11697
Affected Products:
* openSUSE Leap 15.6
* Python 3 Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that contains two features can now be installed.
## Description:
This update for python-pyvmomi fixes the following issues:
* New implementation of package `python311-pyvmomi` to the Python 3 Module
(jsc#PED-11697, jsc#PED-11464)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4271=1
* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-4271=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* python311-pyvmomi-8.0.3.0.1-150600.12.3.2
* Python 3 Module 15-SP6 (noarch)
* python311-pyvmomi-8.0.3.0.1-150600.12.3.2
## References:
* https://jira.suse.com/browse/PED-11464
* https://jira.suse.com/browse/PED-11697
1
0
SUSE-SU-2024:4276-1: important: Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4)
by OPENSUSE-UPDATES 10 Dec '24
by OPENSUSE-UPDATES 10 Dec '24
10 Dec '24
# Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4276-1
Release Date: 2024-12-10T11:04:08Z
Rating: important
References:
* bsc#1225733
* bsc#1229553
Cross-References:
* CVE-2024-36904
* CVE-2024-43861
CVSS scores:
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP2
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_103 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4273=1 SUSE-2024-4274=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4273=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2024-4274=1
* SUSE Linux Enterprise Live Patching 15-SP2
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-4276=1 SUSE-SLE-
Module-Live-Patching-15-SP2-2024-4277=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_20-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_97-default-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-12-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_22-debugsource-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_103-default-12-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_20-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_97-default-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-12-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_22-debugsource-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_103-default-12-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150200_24_178-default-debuginfo-12-150200.2.1
* kernel-livepatch-SLE15-SP2_Update_42-debugsource-16-150200.2.1
* kernel-livepatch-5_3_18-150200_24_169-default-debuginfo-16-150200.2.1
* kernel-livepatch-5_3_18-150200_24_169-default-16-150200.2.1
* kernel-livepatch-SLE15-SP2_Update_45-debugsource-12-150200.2.1
* kernel-livepatch-5_3_18-150200_24_178-default-12-150200.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4275-1: important: Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)
by OPENSUSE-UPDATES 10 Dec '24
by OPENSUSE-UPDATES 10 Dec '24
10 Dec '24
# Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4275-1
Release Date: 2024-12-10T09:42:22Z
Rating: important
References:
* bsc#1223683
* bsc#1225099
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229553
* bsc#1231353
Cross-References:
* CVE-2021-47598
* CVE-2023-52752
* CVE-2023-52846
* CVE-2024-26923
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35864
* CVE-2024-35950
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves 14 vulnerabilities and has one security fix can now be
installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_122 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP)
(bsc#1231353)
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223384).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4275=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4275=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_122-default-6-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-6-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_27-debugsource-6-150400.9.6.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_122-default-6-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-6-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_27-debugsource-6-150400.9.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
* https://bugzilla.suse.com/show_bug.cgi?id=1231353
1
0
SUSE-RU-2024:4269-1: moderate: Recommended update for libnvme, nvme-cli
by OPENSUSE-UPDATES 09 Dec '24
by OPENSUSE-UPDATES 09 Dec '24
09 Dec '24
# Recommended update for libnvme, nvme-cli
Announcement ID: SUSE-RU-2024:4269-1
Release Date: 2024-12-09T16:34:42Z
Rating: moderate
References:
* bsc#1216982
* bsc#1226216
* bsc#1232616
* bsc#1234217
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has four fixes can now be installed.
## Description:
This update for libnvme, nvme-cli fixes the following issues:
* Version update (1.8+79.g69e7772)
* docs: update check-tls-key arguments (bsc#1216982, bsc#1226216).
* docs: update gen-tls-key arguments (bsc#1216982, bsc#1226216).
* docs: update TLS options (bsc#1216982, bsc#1226216).
* fabrics: add support to connect to accept a PSK command line and
configuration (bsc#1216982, bsc#1226216).
* fabrics: fix map error level in __nvmf_add_ctrl (bsc#1216982, bsc#1226216).
* fabrics: add ctrl connect interface (bsc#1216982, bsc#1226216).
* fabrics: use hex numbers when generating command line options (bsc#1216982,
bsc#1226216).
* fabrics: rename first argument for argument macros (bsc#1216982,
bsc#1226216).
* fabrics: do not attempt to import keys if tls is not enabled (bsc#1216982,
bsc#1226216).
* fabrics: skip namespace scan for fabric commands (bsc#1232616).
* json: move keystore operations out of the JSON parser (bsc#1216982,
bsc#1226216).
* json: do not escape strings when printing the configuration (bsc#1216982,
bsc#1226216).
* linux: do not do any keyring ops when no key is provided (bsc#1216982,
bsc#1226216).
* linux: do not return w/o OpenSSL support enabled (bsc#1216982, bsc#1226216).
* linux: fix derive_psk_digest OpenSSL 1.1 version (bsc#1216982, bsc#1226216).
* linux: fixup PSK HMAC type '0' handling (bsc#1216982, bsc#1226216).
* linux: handle key import correctly (bsc#1216982, bsc#1226216).
* linux: export keys to config (bsc#1216982, bsc#1226216).
* linux: only return the description of a key (bsc#1216982, bsc#1226216).
* linux: use ssize_t as return type for nvme_identity_len (bsc#1216982,
bsc#1226216).
* linux: reorder variable declarations (bsc#1216982 bsc#1226216 (bsc#1216982,
bsc#1226216).
* linux: Remove the use of OpenSSL Engine API.
* linux: add import/export function for TLS pre-shared keys (bsc#1216982,
bsc#1226216).
* netapp-smdev: remove redundant code (bsc#1234217).
* netapp-smdev: add verbose output (bsc#1234217).
* netapp-smdev-doc: add verbose details (bsc#1234217).
* netapp-ontapdev: fix JSON output for nsze and nuse (bsc#1234217).
* netapp-ontapdev: fix fw version handling (bsc#1234217).
* netapp-ontapdev-doc: add verbose details (bsc#1232616).
* netapp-ontapdev: add verbose output (bsc#1232616).
* nvme: use unsigned char for hmac and identity (bsc#1216982, bsc#1226216).
* nvme: add support to append TLS PSK to keyfile for check-tls-key
(bsc#1216982, bsc#1226216).
* nvme: return correct error code in append_keyfile (bsc#1216982,
bsc#1226216).
* nvme: add support to add derive TLS PSK to keyfile (bsc#1216982,
bsc#1226216).
* nvme: rename identity to version (bsc#1216982, bsc#1226216).
* nvme: set file permission for keyfile to owner only (bsc#1216982,
bsc#1226216).
* nvme: export tls keys honoring version and hmac (bsc#1216982, bsc#1226216).
* nvme-netapp: update err messages (bsc#1234217).
* nvmf-keys: add udev rule to import tls keys (bsc#1216982, bsc#1226216).
* test: add pre-shared key json tests (bsc#1216982, bsc#1226216).
* test: extend psk to test new 'versioned' API (bsc#1216982, bsc#1226216).
* test: add test case for importing/exporting PSKs (bsc#1216982, bsc#1226216).
* test: make config-diff more flexible to use (bsc#1216982, bsc#1226216).
* tree: optionally skip namespaces during scanning (bsc#1232616).
* tree: do no export tls keys when not provided by user (bsc#1216982,
bsc#1226216).
* tree: read tls_configured_key and tls_keyring from sysfs (bsc#1216982,
bsc#1226216).
* tree: move dhchap and tls sysfs parser into separate functions (bsc#1216982,
bsc#1226216).
* tree: add getter/setters for TLS PSK (bsc#1216982, bsc#1226216).
* util: added error code for ENOKEY (bsc#1216982, bsc#1226216).
* util: Add string constant for ENVME_CONNECT_IGNORED.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4269=1 openSUSE-SLE-15.6-2024-4269=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4269=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libnvme-devel-1.8+79.g69e7772-150600.3.12.2
* nvme-cli-debugsource-2.8+87.g29df38e-150600.3.12.2
* libnvme-mi1-1.8+79.g69e7772-150600.3.12.2
* libnvme-mi1-debuginfo-1.8+79.g69e7772-150600.3.12.2
* libnvme1-debuginfo-1.8+79.g69e7772-150600.3.12.2
* libnvme1-1.8+79.g69e7772-150600.3.12.2
* python3-libnvme-debuginfo-1.8+79.g69e7772-150600.3.12.2
* nvme-cli-2.8+87.g29df38e-150600.3.12.2
* nvme-cli-debuginfo-2.8+87.g29df38e-150600.3.12.2
* libnvme-debugsource-1.8+79.g69e7772-150600.3.12.2
* python3-libnvme-1.8+79.g69e7772-150600.3.12.2
* libnvme-debuginfo-1.8+79.g69e7772-150600.3.12.2
* openSUSE Leap 15.6 (noarch)
* nvme-cli-bash-completion-2.8+87.g29df38e-150600.3.12.2
* nvme-cli-zsh-completion-2.8+87.g29df38e-150600.3.12.2
* nvme-cli-regress-script-2.8+87.g29df38e-150600.3.12.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libnvme-devel-1.8+79.g69e7772-150600.3.12.2
* nvme-cli-debugsource-2.8+87.g29df38e-150600.3.12.2
* libnvme-mi1-1.8+79.g69e7772-150600.3.12.2
* libnvme-mi1-debuginfo-1.8+79.g69e7772-150600.3.12.2
* libnvme1-debuginfo-1.8+79.g69e7772-150600.3.12.2
* libnvme1-1.8+79.g69e7772-150600.3.12.2
* nvme-cli-2.8+87.g29df38e-150600.3.12.2
* nvme-cli-debuginfo-2.8+87.g29df38e-150600.3.12.2
* python3-libnvme-debuginfo-1.8+79.g69e7772-150600.3.12.2
* libnvme-debugsource-1.8+79.g69e7772-150600.3.12.2
* python3-libnvme-1.8+79.g69e7772-150600.3.12.2
* libnvme-debuginfo-1.8+79.g69e7772-150600.3.12.2
* Basesystem Module 15-SP6 (noarch)
* nvme-cli-bash-completion-2.8+87.g29df38e-150600.3.12.2
* nvme-cli-zsh-completion-2.8+87.g29df38e-150600.3.12.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1216982
* https://bugzilla.suse.com/show_bug.cgi?id=1226216
* https://bugzilla.suse.com/show_bug.cgi?id=1232616
* https://bugzilla.suse.com/show_bug.cgi?id=1234217
1
0
09 Dec '24
# Recommended update for net-snmp
Announcement ID: SUSE-RU-2024:4270-1
Release Date: 2024-12-09T16:40:04Z
Rating: moderate
References:
* bsc#1232030
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that has one fix can now be installed.
## Description:
This update for net-snmp fixes the following issue:
* logrotate should use reload instead of restart (bsc#1232030).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4270=1 SUSE-2024-4270=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4270=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-4270=1
## Package List:
* openSUSE Leap 15.6 (x86_64)
* libsnmp40-32bit-5.9.4-150600.24.5.2
* libsnmp40-32bit-debuginfo-5.9.4-150600.24.5.2
* net-snmp-devel-32bit-5.9.4-150600.24.5.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* python3-net-snmp-debuginfo-5.9.4-150600.24.5.2
* perl-SNMP-5.9.4-150600.24.5.2
* net-snmp-debuginfo-5.9.4-150600.24.5.2
* net-snmp-5.9.4-150600.24.5.2
* net-snmp-debugsource-5.9.4-150600.24.5.2
* libsnmp40-debuginfo-5.9.4-150600.24.5.2
* libsnmp40-5.9.4-150600.24.5.2
* perl-SNMP-debuginfo-5.9.4-150600.24.5.2
* net-snmp-devel-5.9.4-150600.24.5.2
* python3-net-snmp-5.9.4-150600.24.5.2
* snmp-mibs-5.9.4-150600.24.5.2
* openSUSE Leap 15.6 (aarch64_ilp32)
* net-snmp-devel-64bit-5.9.4-150600.24.5.2
* libsnmp40-64bit-5.9.4-150600.24.5.2
* libsnmp40-64bit-debuginfo-5.9.4-150600.24.5.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* perl-SNMP-5.9.4-150600.24.5.2
* net-snmp-debuginfo-5.9.4-150600.24.5.2
* net-snmp-5.9.4-150600.24.5.2
* net-snmp-debugsource-5.9.4-150600.24.5.2
* libsnmp40-debuginfo-5.9.4-150600.24.5.2
* libsnmp40-5.9.4-150600.24.5.2
* perl-SNMP-debuginfo-5.9.4-150600.24.5.2
* net-snmp-devel-5.9.4-150600.24.5.2
* snmp-mibs-5.9.4-150600.24.5.2
* SUSE Package Hub 15 15-SP6 (x86_64)
* net-snmp-debuginfo-5.9.4-150600.24.5.2
* net-snmp-debugsource-5.9.4-150600.24.5.2
* libsnmp40-32bit-5.9.4-150600.24.5.2
* libsnmp40-32bit-debuginfo-5.9.4-150600.24.5.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1232030
1
0
openSUSE-SU-2024:0402-1: moderate: Security update for qt6-webengine
by opensuse-securityďĽ opensuse.org 09 Dec '24
by opensuse-securityďĽ opensuse.org 09 Dec '24
09 Dec '24
openSUSE Security Update: Security update for qt6-webengine
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0402-1
Rating: moderate
References: #1233764
Cross-References: CVE-2024-11403
CVSS scores:
CVE-2024-11403 (SUSE): 6.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for qt6-webengine fixes the following issues:
- CVE-2024-11403: Fixed out of bounds memory read/write in libjxl
(boo#1233764)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-402=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 x86_64):
libQt6Pdf6-6.4.2-bp155.2.6.1
libQt6PdfQuick6-6.4.2-bp155.2.6.1
libQt6PdfWidgets6-6.4.2-bp155.2.6.1
libQt6WebEngineCore6-6.4.2-bp155.2.6.1
libQt6WebEngineQuick6-6.4.2-bp155.2.6.1
libQt6WebEngineWidgets6-6.4.2-bp155.2.6.1
qt6-pdf-devel-6.4.2-bp155.2.6.1
qt6-pdf-imports-6.4.2-bp155.2.6.1
qt6-pdf-private-devel-6.4.2-bp155.2.6.1
qt6-pdfquick-devel-6.4.2-bp155.2.6.1
qt6-pdfquick-private-devel-6.4.2-bp155.2.6.1
qt6-pdfwidgets-devel-6.4.2-bp155.2.6.1
qt6-pdfwidgets-private-devel-6.4.2-bp155.2.6.1
qt6-webengine-6.4.2-bp155.2.6.1
qt6-webengine-docs-html-6.4.2-bp155.2.6.1
qt6-webengine-docs-qch-6.4.2-bp155.2.6.1
qt6-webengine-examples-6.4.2-bp155.2.6.1
qt6-webengine-imports-6.4.2-bp155.2.6.1
qt6-webenginecore-devel-6.4.2-bp155.2.6.1
qt6-webenginecore-private-devel-6.4.2-bp155.2.6.1
qt6-webenginequick-devel-6.4.2-bp155.2.6.1
qt6-webenginequick-private-devel-6.4.2-bp155.2.6.1
qt6-webenginewidgets-devel-6.4.2-bp155.2.6.1
qt6-webenginewidgets-private-devel-6.4.2-bp155.2.6.1
References:
https://www.suse.com/security/cve/CVE-2024-11403.html
https://bugzilla.suse.com/1233764
1
0
SUSE-SU-2024:4268-1: important: Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)
by OPENSUSE-UPDATES 09 Dec '24
by OPENSUSE-UPDATES 09 Dec '24
09 Dec '24
# Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4268-1
Release Date: 2024-12-09T12:33:42Z
Rating: important
References:
* bsc#1229553
* bsc#1231353
Cross-References:
* CVE-2024-43861
CVSS scores:
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_128 fixes several issues.
The following security issue was fixed:
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* Fix intermittent nfs mount failures, may be due to SUNRPC over UDP.
(bsc#1231353)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4268=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4268=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-2-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_128-default-2-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_29-debugsource-2-150400.9.6.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-2-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_128-default-2-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_29-debugsource-2-150400.9.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
* https://bugzilla.suse.com/show_bug.cgi?id=1231353
1
0
openSUSE-SU-2024:0396-1: important: Security update for radare2
by opensuse-securityďĽ opensuse.org 09 Dec '24
by opensuse-securityďĽ opensuse.org 09 Dec '24
09 Dec '24
openSUSE Security Update: Security update for radare2
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0396-1
Rating: important
References: #1234065
Cross-References: CVE-2024-29645
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for radare2 fixes the following issues:
Update to version 5.9.8:
- CVE-2024-29645: buffer overflow vulnerability allows an attacker to
execute arbitrary code via the parse_die function (boo#1234065).
- For more details, check full release notes:
https://github.com/radareorg/radare2/releases/tag/5.9.8
https://github.com/radareorg/radare2/releases/tag/5.9.6
https://github.com/radareorg/radare2/releases/tag/5.9.4
https://github.com/radareorg/radare2/releases/tag/5.9.2
https://github.com/radareorg/radare2/releases/tag/5.9.0
https://github.com/radareorg/radare2/releases/tag/5.8.8
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-396=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
radare2-5.9.8-bp155.2.3.1
radare2-devel-5.9.8-bp155.2.3.1
- openSUSE Backports SLE-15-SP5 (noarch):
radare2-zsh-completion-5.9.8-bp155.2.3.1
References:
https://www.suse.com/security/cve/CVE-2024-29645.html
https://bugzilla.suse.com/1234065
1
0
09 Dec '24
openSUSE Security Update: Security update for nanopb
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0400-1
Rating: low
References: #1234088
Cross-References: CVE-2024-53984
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for nanopb fixes the following issues:
- CVE-2024-53984: Fix memory not released on error return (boo#1234088)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-400=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le s390x x86_64):
libprotobuf-nanopb0-0.4.6-bp156.4.3.1
nanopb-devel-0.4.6-bp156.4.3.1
- openSUSE Backports SLE-15-SP6 (noarch):
nanopb-source-0.4.6-bp156.4.3.1
References:
https://www.suse.com/security/cve/CVE-2024-53984.html
https://bugzilla.suse.com/1234088
1
0
openSUSE-SU-2024:0397-1: important: Security update for radare2
by opensuse-securityďĽ opensuse.org 09 Dec '24
by opensuse-securityďĽ opensuse.org 09 Dec '24
09 Dec '24
openSUSE Security Update: Security update for radare2
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0397-1
Rating: important
References: #1234065
Cross-References: CVE-2024-29645
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for radare2 fixes the following issues:
Update to version 5.9.8:
- CVE-2024-29645: buffer overflow vulnerability allows an attacker to
execute arbitrary code via the parse_die function (boo#1234065).
- For more details, check full release notes:
https://github.com/radareorg/radare2/releases/tag/5.9.8
https://github.com/radareorg/radare2/releases/tag/5.9.6
https://github.com/radareorg/radare2/releases/tag/5.9.4
https://github.com/radareorg/radare2/releases/tag/5.9.2
https://github.com/radareorg/radare2/releases/tag/5.9.0
https://github.com/radareorg/radare2/releases/tag/5.8.8
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-397=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le s390x x86_64):
radare2-5.9.8-bp156.4.3.1
radare2-devel-5.9.8-bp156.4.3.1
- openSUSE Backports SLE-15-SP6 (noarch):
radare2-zsh-completion-5.9.8-bp156.4.3.1
References:
https://www.suse.com/security/cve/CVE-2024-29645.html
https://bugzilla.suse.com/1234065
1
0
openSUSE-RU-2024:0401-1: moderate: Recommended update for arch-install-scripts
by maintenanceďĽ opensuse.org 09 Dec '24
by maintenanceďĽ opensuse.org 09 Dec '24
09 Dec '24
openSUSE Recommended Update: Recommended update for arch-install-scripts
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0401-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for arch-install-scripts fixes the following issues:
- New upstream release 29
* arch-chroot: fix unshare chroot /dev symlinks
* arch-chroot: bind mount over a /etc/resolv.conf symlink (requires
mount >= 2.39)
* arch-chroot: add option to preserve the chroot resolv.conf
* arch-chroot: ensure /run is mounted with --make-private
* genfstab: ensure swap devices adhere to -f
* genfstab: remove atgc mount option
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-401=1
Package List:
- openSUSE Backports SLE-15-SP6 (noarch):
arch-install-scripts-29-bp156.3.3.1
References:
1
0
openSUSE-RU-2024:0399-1: moderate: Recommended update for minikube
by maintenanceďĽ opensuse.org 09 Dec '24
by maintenanceďĽ opensuse.org 09 Dec '24
09 Dec '24
openSUSE Recommended Update: Recommended update for minikube
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0399-1
Rating: moderate
References: #1120850 #1227005 #1227017 #1227049
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that solves three vulnerabilities and has one
errata is now available.
Description:
This update for minikube fixes the following issues:
- update to 1.34.0 (boo#1227017 boo#1227049 boo#1227005): For a more
detailed changelog, including changes occurring in pre-release versions,
see CHANGELOG.md.
https://github.com/kubernetes/minikube/blob/master/CHANGELOG.md
* Breaking Changes:
- Bump minimum podman version to 4.9.0 #19457
- Disallow using Docker Desktop 4.34.0 #19576
* Features:
- Bump default Kubernetes version to v1.31.0 #19435
- Add new driver for macOS: vfkit #19423
- Add Parallels driver support for darwin/arm64 #19373
- Add new volcano addon #18602
- Addons ingress-dns: Added support for all architectures #19198
- Support privileged ports on WSL #19370
- VM drivers with docker container-runtime now use docker-buildx for
image building #19339
- Support running x86 QEMU on arm64 #19228
- Add -o json option for addon images command #19364
* Improvements:
- add -d shorthand for --driver #19356
- add -c shorthand for --container-runtime #19217
- kvm2: Don't delete the "default" libvirt network #18920
- Update MINIKUBE_HOME usage #18648
- CNI: Updated permissions to support network policies on kindnet
#19360
- GPU: Set NVIDIA_DRIVER_CAPABILITIES to all when GPU is enabled #19345
- Improved error message when trying to use mount on system missing 9P
#18995
- Improved error message when enabling KVM addons on non-KVM cluster
#19195
- Added warning when loading image with wrong arch #19229
- profile list --output json handle empty config folder #16900
- Check connectivity outside minikube when connectivity issuse #18859
* Bugs:
- Fix not creating API server tunnel for QEMU w/ builtin network #19191
- Fix waiting for user input on firewall unblock when
--interactive=false #19531
- Fix network retry check when subnet already in use for podman #17779
- Fix empty tarball when generating image save #19312
- Fix missing permission for kong-serviceaccount #19002
* Version Upgrades:
- Addon cloud-spanner: Update cloud-spanner-emulator/emulator image
from 1.5.17 to 1.5.23 #19341 #19501
- Addon headlamp: Update headlamp-k8s/headlamp image from v0.23.2 to
v0.25.0 #18992 #19152 #19349
- Addon kong: Update kong image from 3.6.1 to 3.7.1 #19046 #19124
- Addon kubevirt: Update bitnami/kubectl image from 1.30.0 to 1.31.0
#18929 #19087 #19313 #19479
- Addon ingress: Update ingress-nginx/controller image from v1.10.1 to
v1.11.2 #19302 #19461
- Addon inspektor-gadget: Update inspektor-gadget image from v0.27.0
to v0.32.0 #18872 #18931 #19011 #19166 #19411 #19554
- Addon istio-provisioner: Update istio/operator image from 1.21.2 to
1.23.0 #18932 #19052 #19167 #19283 #19450
- Addon nvidia-device-plugin: Update nvidia/k8s-device-plugin image
from v0.15.0 to v0.16.2 #19162 #19266 #19336 #19409
- Addon metrics-server: Update metrics-server/metrics-server image
from v0.7.1 to v0.7.2 #19529
- Addon YAKD: bump marcnuri/yakd image from 0.0.4 to 0.0.5 #19145
- CNI: Update calico from v3.27.3 to v3.28.1 #18870 #19377
- CNI: Update cilium from v1.15.3 to v1.16.1 #18925 #19084 #19247
#19337 #19476
- CNI: Update kindnetd from v20240202-8f1494ea to v20240813-c6f155d6
#18933 #19252 #19265 #19307 #19378 #19446
- CNI: Update flannel from v0.25.1 to v0.25.6 #18966 #19008 #19085
#19297 #19522
- Kicbase: Update nerdctld from 0.6.0 to 0.6.1 #19282
- Kicbase: Bump ubuntu:jammy from 20240427 to 20240808 #19068 #19184
#19478
- Kicbase/ISO: Update buildkit from v0.13.1 to v0.15.2 #19024 #19116
#19264 #19355 #19452
- Kicbase/ISO: Update cni-plugins from v1.4.1 to v1.5.1 #19044 #19128
- Kicbase/ISO: Update containerd from v1.7.15 to v1.7.21 #18934 #19106
#19186 #19298 #19521
- Kicbase/ISO: Update cri-dockerd from v0.3.12 to v0.3.15 #19199 #19249
- Kicbase/ISO: Update crun from 1.14.4 to 1.16.1 #19112 #19389 #19443
- Kicbase/ISO: Update docker from 26.0.2 to 27.2.0 #18993 #19038
#19142 #19153 #19175 #19319 #19326 #19429 #19530
- Kicbase/ISO: Update nerdctl from 1.7.5 to 1.7.6 #18869
- Kicbase/ISO: Update runc from v1.1.12 to v1.1.13 #19104
- update to 1.33.1:
* Bugs:
- Fix DNSSEC validation failed errors #18830
- Fix too many open files errors #18832
- CNI cilium: Fix cilium pods failing to start-up #18846
- Addon ingress: Fix enable failing on arm64 machines using VM driver
#18779
- Addon kubeflow: Fix some components missing arm64 images #18765
* Version Upgrades:
- Addon cloud-spanner: Update cloud-spanner-emulator/emulator image
from 1.5.15 to 1.5.17 #18773 #18811
- Addon headlamp: Update headlamp-k8s/headlamp image from v0.23.1 to
v0.23.2 #18793
- Addon ingress: Update ingress-nginx/controller image from v1.10.0 to
v1.10.1 #18756
- Addon istio-provisioner: Update istio/operator image from 1.21.1 to
1.21.2 #18757
- Addon kubevirt: Update bitnami/kubectl image from 1.29.3 to 1.30.0
#18711 #18771
- Addon nvidia-device-plugin: Update nvidia/k8s-device-plugin image
from v0.14.5 to v0.15.0 #18703
- CNI cilium: Update from v1.15.1 to v1.15.3 #18846
- High Availability: Update kube-vip from 0.7.1 to v0.8.0 #18774
- Kicbase/ISO: Update docker from 26.0.1 to 26.0.2 #18706
- Kicbase: Bump ubuntu:jammy from 20240227 to 20240427 #18702 #18769
#18804
- update to 1.33.0:
* Features:
- Support multi-control plane - HA clusters --ha #17909 Tutorial
- Add support for Kubernetes v1.30 #18669
- Support exposing clusterIP services via minikube service #17877
- Addon gvisor: Add arm64 support #18063 #18453
- New Addon: YAKD - Kubernetes Dashboard addon #17775
* Minor Improvements:
- Add active kubecontext to minikube profile list output #17735
- CNI calico: support kubeadm.pod-network-cidr #18233
- CNI bridge: Ensure pod communications are allowed #16143
- Addon auto-pause: Remove memory leak & add configurable interval
#17936
- image build: Add docker.io/library to image short names #16214
- cp: Create directory if not present #17715
- Move errors getting logs into log output itself #18007
- Add default sysctls to allow privileged ports with no capabilities
#18421
- Include extended attributes in preload tarballs #17829
- Apply kubeadm.applyNodeLabels label to all nodes #16416
- Limit driver status check to 20s #17553
- Include journalctl logs if systemd service fails to start #17659
- Fix "Failed to enable container runtime: sudo systemctl restart
cri-docker" #17907
- Fix containerd redownloading existing images on start #17671
- Fix kvm2 not detecting containerd preload #17658
- Fix modifying Docker binfmt config #17830
- Fix auto-pause addon #17866
- Fix not using preload with overlayfs storage driver #18333
- Fix image repositories not allowing subdomains with numbers #17496
- Fix stopping cluster when using kvm2 with containerd #17967
- Fix starting more than one cluster on kvm2 arm64 #18241
- Fix starting kvm2 clusters using Linux on arm64 Mac #18239
- Fix displaying error when deleting non-existing cluster #17713
- Fix no-limit not being respected on restart #17598
- Fix not applying kubeadm.applyNodeLabels label to nodes added after
inital start #16416
- Fix logs delimiter output #17734
* Bugs:
- Fix unescaped local host regex #18617
- Fix regex on validateNetwork to support special characters #18158
* Version Upgrades:
- Bump Kubernetes version default: v1.30.0 and latest: v1.30.0 #18669
- Addon headlamp: Update headlamp-k8s/headlamp image from v0.23.0 to
0.23.1 #18517
- Addon inspektor-gadget: Update inspektor-gadget image from v0.26.0
to v0.27.0 #18588
- Addon istio-provisioner: Update istio/operator image from 1.21.0 to
1.21.1 #18644
- Addon metrics-server: Update metrics-server/metrics-server image
from v0.7.0 to v0.7.1 #18551
- CNI: Update calico from v3.27.0 to v3.27.3 #18206
- CNI: Update flannel from v0.24.4 to v0.25.1 #18641
- Kicbase/ISO: Update buildkit from v0.13.0 to v0.13.1 #18566
- Kicbase/ISO: Update containerd from v1.7.14 to v1.7.15 #18621
- Kicbase/ISO: Update cri-dockerd from v0.3.3 to v0.3.12 #18585
- Kicbase/ISO: Update crun from 1.14 to 1.14.4 #18610
- Kicbase/ISO: Update docker from 25.0.4 to 26.0.1 #18485 #18649
- Kicbase/ISO: Update nerdctl from 1.7.4 to 1.7.5 #18634
- Kicbase: Update nerdctld from 0.5.1 to 0.6.0 #18647
- update to 1.32.0:
* rootless: support `--container-runtime=docker` #17520
* Install NVIDIA container toolkit during image build (offline support)
* Fix no-limit option for config validation #17530
* NVIDIA GPU support with new `--gpus=nvidia` flag for docker driver
#15927 #17314 #17488
* New `kubeflow` addon #17114
* New `local-path-provisioner` addon #15062
* Kicbase: Add `no-limit` option to `--cpus` & `--memory` flags #17491
* Hyper-V: Add memory validation for odd numbers #17325
* QEMU: Improve cpu type and IP detection #17217
* Mask http(s)_proxy password from startup output #17116
* `--delete-on-faliure` also recreates cluster for kubeadm failures
#16890
* Addon auto-pause: Configure intervals using `--auto-pause- interval`
#17070
* `--kubernetes-version` checks GitHub for version validation and
improved error output for invalid versions #16865
* Bugs:
* QEMU: Fix addons failing to enable #17402
* Fix downloading the wrong kubeadm images for k8s versions after
minikube release #17373
* Fix enabling & disabling addons with non-existing cluster #17324
* Fix delete if container-runtime doesn't exist #17347
* Fix network not found not being detected on new Docker versions #17323
* Fix addon registry doesn't follow Minikube DNS domain name
configuration (--dns-domain) #15585
* Version Upgrades:
* Bump Kubernetes version default: v1.28.3 and latest: v1.28.3
* Addon cloud-spanner: Update cloud-spanner-emulator/emulator image from
1.5.9 to 1.5.11 #17225 #17259
* Addon headlamp: Update headlamp-k8s/headlamp image from v0.19.0 to
v0.20.1 #17135 #17365
* Addon ingress: Update ingress-nginx/controller image from v1.8.1 to
v1.9.3 #17223 #17297 #17348 #17421
* Addon inspektor-gadget: Update inspektor-gadget image from v0.19.0 to
v0.21.0 #17176 #17340
* Addon istio-provisioner: Update istio/operator image from 1.12.2 to
1.19.3 #17383 #17436
* Addon kong: Update kong image from 3.2 to 3.4.2 #17485
* Addon registry: Update registry image from 2.8.1 to 2.8.3 #17382 #17467
* CNI: Update calico from v3.26.1 to v3.26.3 #17363 #17375
* CNI: Update flannel from v0.22.1 to v0.22.3 #17102 #17263
* CNI: Update kindnetd from v20230511-dc714da8 to v20230809-80a64d96
#17233
* Kicbase/ISO: Update buildkit from v0.11.6 to v0.12.2 #17194
* Kicbase/ISO: Update containerd from v1.7.3 to v1.7.7 #17243 #17466
* Kicbase/ISO: Update crictl from v1.21.0 to v1.28.0 #17240
* Kicbase/ISO: Update docker from 24.0.4 to 24.0.6 #17120 #17207
* Kicbase/ISO: Update nerdctl from 1.0.0 to 1.6.2 #17145 #17339 #17434
* Kicbase/ISO: Update runc from v1.1.7 to v1.1.9 #17250
* Kicbase: Bump ubuntu:jammy from 20230624 to 20231004 #17086 #17174
#17345 #17423
- update to 1.31.2:
* docker-env Regression:
* Create `~/.ssh` directory if missing #16934
* Fix adding guest to `~/.ssh/known_hosts` when not needed #17030
* Verify containerd storage separately from docker #16972
* cni: Fix regression in auto selection #16912
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-399=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 x86_64):
minikube-1.34.0-bp156.2.3.1
- openSUSE Backports SLE-15-SP6 (aarch64 x86_64):
docker-machine-driver-kvm2-1.34.0-bp156.2.3.1
- openSUSE Backports SLE-15-SP6 (noarch):
minikube-bash-completion-1.34.0-bp156.2.3.1
References:
https://www.suse.com/security/cve/CVE-2024-3817.html
https://www.suse.com/security/cve/CVE-2024-6104.html
https://www.suse.com/security/cve/CVE-2024-6257.html
https://bugzilla.suse.com/1120850
https://bugzilla.suse.com/1227005
https://bugzilla.suse.com/1227017
https://bugzilla.suse.com/1227049
1
0
openSUSE-RU-2024:0398-1: moderate: Recommended update for libcpuid
by maintenanceďĽ opensuse.org 09 Dec '24
by maintenanceďĽ opensuse.org 09 Dec '24
09 Dec '24
openSUSE Recommended Update: Recommended update for libcpuid
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0398-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP5
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for libcpuid fixes the following issues:
- Update to version 0.7.1:
* Fix cpuid kernel module build on ARM
* Return ERR_NO_CPUID when cpuid kernel module cannot be used on AArch32
* state
* Refactor the build of the bindings (#203)
* Fix build error on AArch64 when HWCAP_CPUID is not defined (#205)
* Fix build on Windows ARM with MSVC (206)
* Fix detection of Intel Meteor Lake
* Support for Intel Arrow Lake
* Support for AMD Turin
- update to 0.7.0:
* Version 0.7.0 (2024-08-26):
* Fix handle leaks in rdmsr.c (#199)
* Fix cpuid_get_hypervisor when NULL data is provided (#199)
* Prevent intel_fn11 array overruns (#199)
* Support for AMD Hawk Point
* Support for more AMD Phoenix (8000 series)
* Add cpu_clock_by_tsc() function to the library (#124)
* Check x86 CPUs MSR support (#185)
* Add support for ARM CPUs (AArch32 + AArch64) (#200)
* Add cpu_feature_level_t enumerated values for x86 CPUs (#177)
* Support up to 4 subleaf entries for CPUID leaf 0x80000026 (#189)
* Support for Extended CPU topology subleaf in
cpuid_identify_purpose_amd() (#189)
* Support CPU purpose for AMD x86 CPUs (#189)
* Add cpuid Linux and FreeBSD kernel modules for ARM CPUs
* Improve errors handling in cpuid_get_all_raw_data() and
cpuid_get_raw_data_core() (#202)
* Support get_total_cpus() on DragonFly BSD
* Improve set_cpu_affinity() on NetBSD
* Fix build on OpenBSD
* Improve behavior when CPU affinity cannot be set
* Fix a regression in cpuid_tool about arguments doing nothing (like
--rdmsr or --cpuid)
* Fix a segmentation fault when using --quiet in cpuid_tool
* Improve error handling in cpu_identify_all()
* Add Python bindings (#197)
* Support for AMD Granite Ridge
* Support for AMD Strix Point
* Detect x2APIC and AVX512 features for AMD x86 CPUs
- update to release 0.6.5
* Support for Intel Bay Trail-M
* Support for Intel Bay Trail-T
* Support for Intel Bay Trail-D
* Support for AMD Storm Peak
* Support for Intel Raport Lake Refresh
* Support heterogeneous RAW dumps in cpu_identify_all()
* Support for Intel Meteor Lake, including detection of LP E-Cores
* Support for Intel Emerald Rapids-SP
* Support for more AMD Van Gogh
- Update to release 0.6.4
* Support for AMD Genoa, Phoenix, Dragon Range, Ryzen Z1
* Support for Intel Sapphire Rapids-WS, Skylake (server), Cascade Lake,
Ice-Lake (server), Sapphire Rapids-SP, Raptor Lake-H/HX, Apollo lake
* Improve support for Arrandale, Alder-Lake and Raptor-Lake P/U
* Initial support for Centaur CPUs (VIA and Zhaoxin)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-398=1
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-398=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le x86_64):
libcpuid-debuginfo-0.7.1-bp156.2.3.1
libcpuid-debugsource-0.7.1-bp156.2.3.1
libcpuid-devel-0.7.1-bp156.2.3.1
libcpuid-tools-0.7.1-bp156.2.3.1
libcpuid-tools-debuginfo-0.7.1-bp156.2.3.1
libcpuid17-0.7.1-bp156.2.3.1
libcpuid17-debuginfo-0.7.1-bp156.2.3.1
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le x86_64):
libcpuid-devel-0.7.1-bp155.2.3.1
libcpuid-tools-0.7.1-bp155.2.3.1
libcpuid17-0.7.1-bp155.2.3.1
References:
1
0
09 Dec '24
# Recommended update for go1.23
Announcement ID: SUSE-RU-2024:4259-1
Release Date: 2024-12-09T09:07:04Z
Rating: moderate
References:
* bsc#1229122
* jsc#PED-11485
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that contains one feature and has one fix can now be installed.
## Description:
This update for go1.23 fixes the following issues:
* go1.23.4 (released 2024-12-03) includes fixes to the compiler, the runtime,
the trace command, and the syscall package. (bsc#1229122)
* go#70644 crypto/rsa: new key generation prohibitively slow under race
detector
* go#70645 proposal: go/types: add Scope.Node convenience getter
* go#70646 x/tools/gopls: unimported completion corrupts import decl
(client=BBEdit)
* go#70648 crypto/tls: TestHandshakeClientECDHEECDSAAESGCM/TLSv12 failures
* go#70649 x/benchmarks/sweet/cmd/sweet: TestSweetEndToEnd failures
* go#70650 crypto/tls: TestGetClientCertificate/TLSv13 failures
* go#70651 x/tools/go/gcexportdata: simplify implementation assuming go >=
1.21
* go#70654 cmd/go: Incorrect output from go list
* go#70655 x/build/cmd/relui: add workflows for some remaining manual
recurring Go major release cycle tasks
* go#70657 proposal: bufio: Scanner.IterText/Scanner.IterBytes
* go#70658 x/net/http2: stuck extended CONNECT requests
* go#70659 os: TestRootDirFS failures on linux-mips64 and linux-mips64le arch-
mips
* go#70660 crypto/ecdsa: TestRFC6979 failures on s390x
* go#70664 x/mobile: target maccatalyst cannot find OpenGLES header
* go#70665 x/tools/gopls: refactor.extract.variable fails at package level
* go#70666 x/tools/gopls: panic in GetIfaceStubInfo
* go#70667 proposal: crypto/x509: support extracting X25519 public keys from
certificates
* go#70668 proposal: x/mobile: better support for unrecovered panics
* go#70669 cmd/go: local failure in TestScript/build_trimpath_cgo
* go#70670 cmd/link: unused functions aren't getting deadcoded from the binary
* go#70674 x/pkgsite: package removal request for
https://pkg.go.dev/github.com/uisdevsquad/go-test/debugmate
* go#70675 cmd/go/internal/lockedfile: mountrpc flake in TestTransform on
plan9
* go#70677 all: remote file server I/O flakiness with "Bad fid" errors on
plan9
* go#70678 internal/poll: deadlock on 'Intel(R) Xeon(R) Platinum' when an FD
is closed
* go#70679 mime/multipart: With go 1.23.3, mime/multipart does not link
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4259=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4259=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4259=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4259=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4259=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4259=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4259=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4259=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4259=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4259=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4259=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4259=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4259=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* go1.23-doc-1.23.4-150000.1.15.1
* go1.23-1.23.4-150000.1.15.1
* go1.23-race-1.23.4-150000.1.15.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229122
* https://jira.suse.com/browse/PED-11485
1
0
09 Dec '24
# Recommended update for go1.22
Announcement ID: SUSE-RU-2024:4260-1
Release Date: 2024-12-09T09:08:05Z
Rating: moderate
References:
* bsc#1218424
* jsc#PED-11485
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that contains one feature and has one fix can now be installed.
## Description:
This update for go1.22 fixes the following issues:
* go1.22.10 (released 2024-12-03) includes fixes to the runtime and the
syscall package. (bsc#1218424)
* go#70201 syscall: SyscallN always escapes the variadic argument
* go#70238 time: TestLoadFixed failures
* go#70474 sync/atomic: TestNilDeref flaky failure on windows-386 with runtime
fatal error
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4260=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4260=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4260=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4260=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4260=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4260=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4260=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4260=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4260=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4260=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4260=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4260=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4260=1
## Package List:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* go1.22-doc-1.22.10-150000.1.36.1
* go1.22-1.22.10-150000.1.36.1
* go1.22-race-1.22.10-150000.1.36.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1218424
* https://jira.suse.com/browse/PED-11485
1
0
SUSE-SU-2024:4262-1: important: Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)
by OPENSUSE-UPDATES 09 Dec '24
by OPENSUSE-UPDATES 09 Dec '24
09 Dec '24
# Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4262-1
Release Date: 2024-12-09T10:03:55Z
Rating: important
References:
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229553
* bsc#1231353
Cross-References:
* CVE-2021-47598
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves four vulnerabilities and has one security fix can now be
installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_125 fixes several issues.
The following security issues were fixed:
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
Non-security issues fixed:
* Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP)
(bsc#1231353)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4262=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4262=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-4-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_125-default-4-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_28-debugsource-4-150400.9.6.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-4-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_125-default-4-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_28-debugsource-4-150400.9.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
* https://bugzilla.suse.com/show_bug.cgi?id=1231353
1
0
SUSE-SU-2024:4264-1: important: Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3)
by OPENSUSE-UPDATES 09 Dec '24
by OPENSUSE-UPDATES 09 Dec '24
09 Dec '24
# Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3)
Announcement ID: SUSE-SU-2024:4264-1
Release Date: 2024-12-09T10:04:26Z
Rating: important
References:
* bsc#1210619
* bsc#1220145
* bsc#1220537
* bsc#1221302
* bsc#1223059
* bsc#1223363
* bsc#1223514
* bsc#1223683
* bsc#1225013
* bsc#1225202
* bsc#1225211
* bsc#1225302
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225733
* bsc#1225819
* bsc#1226325
* bsc#1227471
* bsc#1227651
* bsc#1228573
* bsc#1229553
Cross-References:
* CVE-2021-46955
* CVE-2021-47291
* CVE-2021-47378
* CVE-2021-47383
* CVE-2021-47402
* CVE-2021-47598
* CVE-2022-48651
* CVE-2023-1829
* CVE-2023-52752
* CVE-2024-23307
* CVE-2024-26610
* CVE-2024-26828
* CVE-2024-26852
* CVE-2024-26923
* CVE-2024-27398
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35864
* CVE-2024-35950
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-46955 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves 23 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_158 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2021-47291: ipv6: fix another slab-out-of-bounds in
fib6_nh_flush_exceptions (bsc#1227651).
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
* CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free
(bsc#1225202).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
* CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit
(bsc#1225211).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
* CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when
fragmenting IPv4 packets (bsc#1220537).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1220145).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223059).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223514).
* CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
filter (tcindex) (bsc#1210619).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4264=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4264=1
## Package List:
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP3_Update_43-debugsource-9-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_158-default-debuginfo-9-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_158-default-9-150300.7.6.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_158-preempt-9-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_158-preempt-debuginfo-9-150300.7.6.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_158-default-9-150300.7.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-46955.html
* https://www.suse.com/security/cve/CVE-2021-47291.html
* https://www.suse.com/security/cve/CVE-2021-47378.html
* https://www.suse.com/security/cve/CVE-2021-47383.html
* https://www.suse.com/security/cve/CVE-2021-47402.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2023-1829.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1210619
* https://bugzilla.suse.com/show_bug.cgi?id=1220145
* https://bugzilla.suse.com/show_bug.cgi?id=1220537
* https://bugzilla.suse.com/show_bug.cgi?id=1221302
* https://bugzilla.suse.com/show_bug.cgi?id=1223059
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223514
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225202
* https://bugzilla.suse.com/show_bug.cgi?id=1225211
* https://bugzilla.suse.com/show_bug.cgi?id=1225302
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1227651
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4265-1: important: Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4)
by OPENSUSE-UPDATES 09 Dec '24
by OPENSUSE-UPDATES 09 Dec '24
09 Dec '24
# Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4265-1
Release Date: 2024-12-09T10:04:37Z
Rating: important
References:
* bsc#1225733
* bsc#1229553
Cross-References:
* CVE-2024-36904
* CVE-2024-43861
CVSS scores:
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_100 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4265=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4265=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_100-default-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_21-debugsource-14-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_100-default-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-14-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_21-debugsource-14-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4266-1: important: Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4)
by OPENSUSE-UPDATES 09 Dec '24
by OPENSUSE-UPDATES 09 Dec '24
09 Dec '24
# Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4266-1
Release Date: 2024-12-09T10:04:52Z
Rating: important
References:
* bsc#1220145
* bsc#1220832
* bsc#1221302
* bsc#1222685
* bsc#1222882
* bsc#1223059
* bsc#1223363
* bsc#1223514
* bsc#1223521
* bsc#1223681
* bsc#1223683
* bsc#1225011
* bsc#1225012
* bsc#1225013
* bsc#1225099
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225313
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1226327
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229553
* bsc#1231353
Cross-References:
* CVE-2021-47598
* CVE-2022-48651
* CVE-2022-48662
* CVE-2023-52502
* CVE-2023-52752
* CVE-2023-52846
* CVE-2023-6546
* CVE-2024-23307
* CVE-2024-26610
* CVE-2024-26766
* CVE-2024-26828
* CVE-2024-26852
* CVE-2024-26923
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-35817
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35867
* CVE-2024-35905
* CVE-2024-35950
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52502 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves 29 vulnerabilities and has one security fix can now be
installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_111 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1225011).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP)
(bsc#1231353)
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223521).
* CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1220145).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223059).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223514).
* CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
(bsc#1222882).
* CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and
nfc_llcp_sock_get_sn() (bsc#1220832).
* CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via
the GSMIOC_SETCONF ioctl that could lead to local privilege escalation
(bsc#1222685).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4266=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4266=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_111-default-9-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_111-default-debuginfo-9-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_24-debugsource-9-150400.9.6.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_111-default-9-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_111-default-debuginfo-9-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_24-debugsource-9-150400.9.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2023-52502.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2023-6546.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26766.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220145
* https://bugzilla.suse.com/show_bug.cgi?id=1220832
* https://bugzilla.suse.com/show_bug.cgi?id=1221302
* https://bugzilla.suse.com/show_bug.cgi?id=1222685
* https://bugzilla.suse.com/show_bug.cgi?id=1222882
* https://bugzilla.suse.com/show_bug.cgi?id=1223059
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223514
* https://bugzilla.suse.com/show_bug.cgi?id=1223521
* https://bugzilla.suse.com/show_bug.cgi?id=1223681
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225011
* https://bugzilla.suse.com/show_bug.cgi?id=1225012
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225313
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1226327
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
* https://bugzilla.suse.com/show_bug.cgi?id=1231353
1
0
# Security update for glib2
Announcement ID: SUSE-SU-2024:4254-1
Release Date: 2024-12-06T17:03:29Z
Rating: important
References:
* bsc#1231463
* bsc#1233282
Cross-References:
* CVE-2024-52533
CVSS scores:
* CVE-2024-52533 ( SUSE ): 7.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-52533 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
* CVE-2024-52533 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for glib2 fixes the following issues:
Security issues fixed:
* CVE-2024-52533: Fix a single byte buffer overflow in set_connect_msg()
(bsc#1233282).
Non-security issue fixed:
* Fix error when uninstalling packages (bsc#1231463).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4254=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4254=1 openSUSE-SLE-15.6-2024-4254=1
## Package List:
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libglib-2_0-0-debuginfo-2.78.6-150600.4.8.1
* libgthread-2_0-0-2.78.6-150600.4.8.1
* glib2-debugsource-2.78.6-150600.4.8.1
* libglib-2_0-0-2.78.6-150600.4.8.1
* libgobject-2_0-0-2.78.6-150600.4.8.1
* glib2-devel-2.78.6-150600.4.8.1
* libgmodule-2_0-0-debuginfo-2.78.6-150600.4.8.1
* libgthread-2_0-0-debuginfo-2.78.6-150600.4.8.1
* glib2-devel-debuginfo-2.78.6-150600.4.8.1
* libgmodule-2_0-0-2.78.6-150600.4.8.1
* glib2-tools-2.78.6-150600.4.8.1
* glib2-tools-debuginfo-2.78.6-150600.4.8.1
* libgio-2_0-0-2.78.6-150600.4.8.1
* libgobject-2_0-0-debuginfo-2.78.6-150600.4.8.1
* libgio-2_0-0-debuginfo-2.78.6-150600.4.8.1
* Basesystem Module 15-SP6 (noarch)
* glib2-lang-2.78.6-150600.4.8.1
* Basesystem Module 15-SP6 (x86_64)
* libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* libgio-2_0-0-32bit-2.78.6-150600.4.8.1
* libglib-2_0-0-32bit-2.78.6-150600.4.8.1
* libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* libgmodule-2_0-0-32bit-2.78.6-150600.4.8.1
* libgobject-2_0-0-32bit-2.78.6-150600.4.8.1
* libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* openSUSE Leap 15.6 (noarch)
* gio-branding-upstream-2.78.6-150600.4.8.1
* glib2-lang-2.78.6-150600.4.8.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* glib2-tests-devel-debuginfo-2.78.6-150600.4.8.1
* glib2-devel-static-2.78.6-150600.4.8.1
* libglib-2_0-0-debuginfo-2.78.6-150600.4.8.1
* glib2-debugsource-2.78.6-150600.4.8.1
* libgthread-2_0-0-2.78.6-150600.4.8.1
* glib2-doc-2.78.6-150600.4.8.1
* libglib-2_0-0-2.78.6-150600.4.8.1
* libgobject-2_0-0-2.78.6-150600.4.8.1
* glib2-devel-2.78.6-150600.4.8.1
* libgmodule-2_0-0-debuginfo-2.78.6-150600.4.8.1
* libgthread-2_0-0-debuginfo-2.78.6-150600.4.8.1
* glib2-devel-debuginfo-2.78.6-150600.4.8.1
* libgmodule-2_0-0-2.78.6-150600.4.8.1
* glib2-tools-2.78.6-150600.4.8.1
* glib2-tools-debuginfo-2.78.6-150600.4.8.1
* libgio-2_0-0-2.78.6-150600.4.8.1
* libgobject-2_0-0-debuginfo-2.78.6-150600.4.8.1
* glib2-tests-devel-2.78.6-150600.4.8.1
* libgio-2_0-0-debuginfo-2.78.6-150600.4.8.1
* openSUSE Leap 15.6 (x86_64)
* libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* glib2-devel-32bit-debuginfo-2.78.6-150600.4.8.1
* libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* libgthread-2_0-0-32bit-2.78.6-150600.4.8.1
* glib2-devel-32bit-2.78.6-150600.4.8.1
* libgthread-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* glib2-tools-32bit-2.78.6-150600.4.8.1
* libgio-2_0-0-32bit-2.78.6-150600.4.8.1
* libglib-2_0-0-32bit-2.78.6-150600.4.8.1
* libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* libgmodule-2_0-0-32bit-2.78.6-150600.4.8.1
* glib2-tools-32bit-debuginfo-2.78.6-150600.4.8.1
* libgobject-2_0-0-32bit-2.78.6-150600.4.8.1
* libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.8.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libgio-2_0-0-64bit-debuginfo-2.78.6-150600.4.8.1
* libglib-2_0-0-64bit-2.78.6-150600.4.8.1
* libgthread-2_0-0-64bit-debuginfo-2.78.6-150600.4.8.1
* glib2-devel-64bit-debuginfo-2.78.6-150600.4.8.1
* glib2-devel-64bit-2.78.6-150600.4.8.1
* libgmodule-2_0-0-64bit-debuginfo-2.78.6-150600.4.8.1
* glib2-tools-64bit-2.78.6-150600.4.8.1
* libglib-2_0-0-64bit-debuginfo-2.78.6-150600.4.8.1
* libgmodule-2_0-0-64bit-2.78.6-150600.4.8.1
* libgobject-2_0-0-64bit-debuginfo-2.78.6-150600.4.8.1
* libgthread-2_0-0-64bit-2.78.6-150600.4.8.1
* libgobject-2_0-0-64bit-2.78.6-150600.4.8.1
* glib2-tools-64bit-debuginfo-2.78.6-150600.4.8.1
* libgio-2_0-0-64bit-2.78.6-150600.4.8.1
## References:
* https://www.suse.com/security/cve/CVE-2024-52533.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231463
* https://bugzilla.suse.com/show_bug.cgi?id=1233282
1
0
06 Dec '24
# Security update for kernel-firmware
Announcement ID: SUSE-SU-2024:4255-1
Release Date: 2024-12-06T17:10:46Z
Rating: important
References:
* bsc#1229069
* bsc#1229272
* bsc#1230007
* bsc#1230596
* bsc#1234027
Cross-References:
* CVE-2023-31315
CVSS scores:
* CVE-2023-31315 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability and has four security fixes can now be
installed.
## Description:
This update for kernel-firmware fixes the following issues:
* Update to version 20241128 (git commit ea71da6f0690):
* i915: Update Xe2LPD DMC to v2.24
* cirrus: cs35l56: Add firmware for Cirrus CS35L56 for various Dell laptops
* iwlwifi: add Bz-gf FW for core89-91 release
* amdgpu: update smu 13.0.10 firmware
* amdgpu: update sdma 6.0.3 firmware
* amdgpu: update psp 13.0.10 firmware
* amdgpu: update gc 11.0.3 firmware
* amdgpu: add smu 13.0.14 firmware
* amdgpu: add sdma 4.4.5 firmware
* amdgpu: add psp 13.0.14 firmware
* amdgpu: add gc 9.4.4 firmware
* amdgpu: update vcn 3.1.2 firmware
* amdgpu: update psp 13.0.5 firmware
* amdgpu: update psp 13.0.8 firmware
* amdgpu: update vega20 firmware
* amdgpu: update vega12 firmware
* amdgpu: update psp 14.0.4 firmware
* amdgpu: update gc 11.5.2 firmware
* amdgpu: update vega10 firmware
* amdgpu: update vcn 4.0.0 firmware
* amdgpu: update smu 13.0.0 firmware
* amdgpu: update psp 13.0.0 firmware
* amdgpu: update gc 11.0.0 firmware
* amdgpu: update beige goby firmware
* amdgpu: update vangogh firmware
* amdgpu: update dimgrey cavefish firmware
* amdgpu: update navy flounder firmware
* amdgpu: update psp 13.0.11 firmware
* amdgpu: update gc 11.0.4 firmware
* amdgpu: update vcn 4.0.2 firmware
* amdgpu: update psp 13.0.4 firmware
* amdgpu: update gc 11.0.1 firmware
* amdgpu: update sienna cichlid firmware
* amdgpu: update vpe 6.1.1 firmware
* amdgpu: update vcn 4.0.6 firmware
* amdgpu: update psp 14.0.1 firmware
* amdgpu: update gc 11.5.1 firmware
* amdgpu: update vcn 4.0.5 firmware
* amdgpu: update psp 14.0.0 firmware
* amdgpu: update gc 11.5.0 firmware
* amdgpu: update navi14 firmware
* amdgpu: update arcturus firmware
* amdgpu: update renoir firmware
* amdgpu: update navi12 firmware
* amdgpu: update sdma 4.4.2 firmware
* amdgpu: update psp 13.0.6 firmware
* amdgpu: update gc 9.4.3 firmware
* amdgpu: update vcn 4.0.4 firmware
* amdgpu: update psp 13.0.7 firmware
* amdgpu: update gc 11.0.2 firmware
* amdgpu: update navi10 firmware
* amdgpu: update aldebaran firmware
* Update aliases from 6.13-rc1
* Update to version 20241125 (git commit 508d770ee6f3):
* ice: update ice DDP wireless_edge package to 1.3.20.0
* ice: update ice DDP comms package to 1.3.52.0
* ice: update ice DDP package to ice-1.3.41.0
* amdgpu: update DMCUB to v9.0.10.0 for DCN314
* amdgpu: update DMCUB to v9.0.10.0 for DCN351
* Update to version 20241121 (git commit 48bb90cceb88):
* linux-firmware: Update AMD cpu microcode
* xe: Update GUC to v70.36.0 for BMG, LNL
* i915: Update GUC to v70.36.0 for ADL-P, DG1, DG2, MTL, TGL
* Update to version 20241119 (git commit 60cdfe1831e8):
* iwlwifi: add Bz-gf FW for core91-69 release
* Update aliases from 6.12
* Update to version 20241113 (git commit 1727aceef4d2):
* qcom: venus-5.4: add venus firmware file for qcs615
* qcom: update venus firmware file for SC7280
* QCA: Add 22 bluetooth firmware nvm files for QCA2066
* Update to version 20241112 (git commit c57a0a42468b):
* mediatek MT7922: update bluetooth firmware to 20241106163512
* mediatek MT7921: update bluetooth firmware to 20241106151414
* linux-firmware: update firmware for MT7922 WiFi device
* linux-firmware: update firmware for MT7921 WiFi device
* qcom: Add QDU100 firmware image files.
* qcom: Update aic100 firmware files
* dedup-firmware.sh: fix infinite loop for --verbose
* rtl_bt: Update RTL8852BT/RTL8852BE-VT BT USB FW to 0x04D7_63F7
* cnm: update chips&media wave521c firmware.
* mediatek MT7920: update bluetooth firmware to 20241104091246
* linux-firmware: update firmware for MT7920 WiFi device
* copy-firmware.sh: Run check_whence.py only if in a git repo
* cirrus: cs35l56: Add firmware for Cirrus CS35L56 for various Dell laptops
* amdgpu: update DMCUB to v9.0.10.0 for DCN351
* rtw89: 8852a: update fw to v0.13.36.2
* rtw88: Add firmware v52.14.0 for RTL8812AU
* i915: Update Xe2LPD DMC to v2.23
* linux-firmware: update firmware for mediatek bluetooth chip (MT7925)
* linux-firmware: update firmware for MT7925 WiFi device
* WHENCE: Add sof-tolg for mt8195
* linux-firmware: Update firmware file for Intel BlazarI core
* qcom: Add link for QCS6490 GPU firmware
* qcom: update gpu firmwares for qcs615 chipset
* cirrus: cs35l56: Update firmware for Cirrus Amps for some HP laptops
* mediatek: Add sof-tolg for mt8195
* Update to version 20241029 (git commit 048795eef350):
* ath11k: move WCN6750 firmware to the device-specific subdir
* xe: Update LNL GSC to v104.0.0.1263
* i915: Update MTL/ARL GSC to v102.1.15.1926
* Update to version 20241028 (git commit 987607d681cb):
* amdgpu: DMCUB updates for various AMDGPU ASICs
* i915: Add Xe3LPD DMC
* cnm: update chips&media wave521c firmware.
* linux-firmware: Add firmware for Cirrus CS35L41
* linux-firmware: Update firmware file for Intel BlazarU core
* Makefile: error out of 'install' if COPYOPTS is set
* Update to version 20241018 (git commit 2f0464118f40):
* check_whence.py: skip some validation if git ls-files fails
* qcom: Add Audio firmware for X1E80100 CRD/QCPs
* amdgpu: DMCUB updates forvarious AMDGPU ASICs
* brcm: replace NVRAM for Jetson TX1
* rtlwifi: Update firmware for RTL8192FU to v7.3
* make: separate installation and de-duplication targets
* check_whence.py: check the permissions
* Remove execute bit from firmware files
* configure: remove unused file
* rtl_nic: add firmware rtl8125d-1
* Update to version 20241014 (git commit 99f9c7ed1f4a):
* iwlwifi: add gl/Bz FW for core91-69 release
* iwlwifi: update ty/So/Ma firmwares for core91-69 release
* iwlwifi: update cc/Qu/QuZ firmwares for core91-69 release
* cirrus: cs35l56: Add firmware for Cirrus CS35L56 for a Lenovo Laptop
* cirrus: cs35l56: Add firmware for Cirrus CS35L56 for some ASUS laptops
* cirrus: cs35l56: Add firmware for Cirrus Amps for some HP laptops
* linux-firmware: update firmware for en8811h 2.5G ethernet phy
* QCA: Add Bluetooth firmwares for WCN785x with UART transport
* Update to version 20241011 (git commit 808cba847c70):
* mtk_wed: add firmware for mt7988 Wireless Ethernet Dispatcher
* ath12k: WCN7850 hw2.0: update board-2.bin (bsc#1230596)
* ath12k: QCN9274 hw2.0: add to WLAN.WBE.1.3.1-00162-QCAHKSWPL_SILICONZ-1
* ath12k: QCN9274 hw2.0: add board-2.bin
* copy-firmware.sh: rename variables in symlink hanlding
* copy-firmware.sh: remove no longer reachable test -L
* copy-firmware.sh: remove no longer reachable test -f
* copy-firmware.sh: call ./check_whence.py before parsing the file
* copy-firmware.sh: warn if the destination folder is not empty
* copy-firmware.sh: add err() helper
* copy-firmware.sh: fix indentation
* copy-firmware.sh: reset and consistently handle destdir
* Revert "copy-firmware: Support additional compressor options"
* copy-firmware.sh: flesh out and fix dedup-firmware.sh
* Style update yaml files
* editorconfig: add initial config file
* check_whence.py: annotate replacement strings as raw
* check_whence.py: LC_ALL=C sort -u the filelist
* check_whence.py: ban link-to-a-link
* check_whence.py: use consistent naming
* Add a link from TAS2XXX1EB3.bin -> ti/tas2781/TAS2XXX1EB30.bin
* tas2781: Upload dsp firmware for ASUS laptop 1EB30 & 1EB31
* Drop obsoleted --ignore-duplicates option to copy-firmware.sh
* Drop the ath12k workaround again
* Update to version 20241010 (git commit d4e688aa74a0):
* rtlwifi: Add firmware v39.0 for RTL8192DU
* Revert "ath12k: WCN7850 hw2.0: update board-2.bin" (replaced with a newer
firmware in this package instead)
* update aliases
* Update to version 20241004 (git commit bbb77872a8a7):
* amdgpu: DMCUB DCN35 update
* brcm: Add BCM4354 NVRAM for Jetson TX1
* brcm: Link FriendlyElec NanoPi M4 to AP6356S nvram
* Update to version 20241001 (git commit 51e5af813eaf):
* linux-firmware: add firmware for MediaTek Bluetooth chip (MT7920)
* linux-firmware: add firmware for MT7920
* amdgpu: update raven firmware
* amdgpu: update SMU 13.0.10 firmware
* amdgpu: update PSP 13.0.10 firmware
* amdgpu: update GC 11.0.3 firmware
* amdgpu: update VCN 3.1.2 firmware
* amdgpu: update PSP 13.0.5 firmware
* amdgpu: update PSP 13.0.8 firmware
* amdgpu: update vega12 firmware
* amdgpu: update PSP 14.0.4 firmware
* amdgpu: update GC 11.5.2 firmware
* amdgpu: update vega10 firmware
* amdgpu: update VCN 4.0.0 firmware
* amdgpu: update PSP 13.0.0 firmware
* amdgpu: update GC 11.0.0 firmware
* amdgpu: update picasso firmware
* amdgpu: update beige goby firmware
* amdgpu: update vangogh firmware
* amdgpu: update dimgrey cavefish firmware
* amdgpu: update navy flounder firmware
* amdgpu: update green sardine firmware
* amdgpu: update VCN 4.0.2 firmware
* amdgpu: update PSP 13.0.4 firmware
* amdgpu: update GC 11.0.1 firmware
* amdgpu: update sienna cichlid firmware
* amdgpu: update VCN 4.0.6 firmware
* amdgpu: update PSP 14.0.1 firmware
* amdgpu: update GC 11.5.1 firmware
* amdgpu: update VCN 4.0.5 firmware
* amdgpu: update PSP 14.0.0 firmware
* amdgpu: update GC 11.5.0 firmware
* amdgpu: update navi14 firmware
* amdgpu: update renoir firmware
* amdgpu: update navi12 firmware
* amdgpu: update SMU 13.0.6 firmware
* amdgpu: update SDMA 4.4.2 firmware
* amdgpu: update PSP 13.0.6 firmware
* amdgpu: update GC 9.4.3 firmware
* amdgpu: update yellow carp firmware
* amdgpu: update VCN 4.0.4 firmware
* amdgpu: update PSP 13.0.7 firmware
* amdgpu: update GC 11.0.2 firmware
* amdgpu: update navi10 firmware
* amdgpu: update aldebaran firmware
* qcom: update gpu firmwares for qcm6490 chipset
* mt76: mt7996: add firmware files for mt7992 chipset
* mt76: mt7996: add firmware files for mt7996 chipset variants
* qcom: add gpu firmwares for sa8775p chipset
* rtw89: 8922a: add fw format-2 v0.35.42.1
* Pick up the fixed ath12k firmware from https://git.codelinaro.org/clo/ath-
firmware/ath12k-firmware (bsc#1230596)
* Update aliases from 6.11.x and 6.12-rc1
* Update to version 20240913 (git commit bcbdd1670bc3):
* amdgpu: update DMCUB to v0.0.233.0 DCN351
* copy-firmware: Handle links to uncompressed files
* WHENCE: Fix battmgr.jsn entry type
* Temporary revert for ath12k firmware (bsc#1230596)
* Update to version 20240912 (git commit 47c72fee8fe3):
* amdgpu: Add VPE 6.1.3 microcode
* amdgpu: add SDMA 6.1.2 microcode
* amdgpu: Add support for PSP 14.0.4
* amdgpu: add GC 11.5.2 microcode
* qcom: qcm6490: add ADSP and CDSP firmware
* linux-firmware: Update firmware file for Intel Bluetooth Magnetor core
* linux-firmware: Update firmware file for Intel BlazarU core
* linux-firmware: Update firmware file for Intel Bluetooth Solar core
* Update to version 20240911 (git commit 59def907425d):
* rtl_bt: Update RTL8852B BT USB FW to 0x0447_9301 (bsc#1229272)
* Update to version 20240910 (git commit 2a7b69a3fa30):
* realtek: rt1320: Add patch firmware of MCU
* i915: Update MTL DMC v2.23
* cirrus: cs35l56: Add firmware for Cirrus CS35L54 for some HP laptops
* Update to version 20240903 (git commit 96af55bd3d0b):
* amdgpu: Revert sienna cichlid dmcub firmware update (bsc#1230007)
* iwlwifi: add Bz FW for core89-58 release
* rtl_nic: add firmware rtl8126a-3
* linux-firmware: update firmware for MT7921 WiFi device
* linux-firmware: update firmware for mediatek bluetooth chip (MT7921)
* Update to version 20240830 (git commit d6c600d46981):
* amdgpu: update DMCUB to v0.0.232.0 for DCN314 and DCN351
* qcom: vpu: restore compatibility with kernels before 6.6
* Update to version 20240826 (git commit bec4fd18cc57): (including ath11k f/w
updates for bsc#1234027)
* amdgpu: DMCUB updates forvarious AMDGPU ASICs
* rtw89: 8922a: add fw format-1 v0.35.41.0
* linux-firmware: update firmware for MT7925 WiFi device
* linux-firmware: update firmware for mediatek bluetooth chip (MT7925)
* rtl_bt: Add firmware and config files for RTL8922A
* rtl_bt: Add firmware file for the the RTL8723CS Bluetooth part
* rtl_bt: de-dupe identical config.bin files
* rename rtl8723bs_config-OBDA8723.bin -> rtl_bt/rtl8723bs_config.bin
* linux-firmware: Update AMD SEV firmware
* linux-firmware: update firmware for MT7996
* Revert "i915: Update MTL DMC v2.22"
* ath12k: WCN7850 hw2.0: update board-2.bin
* ath11k: WCN6855 hw2.0: update to
WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.41
* ath11k: WCN6855 hw2.0: update board-2.bin
* ath11k: QCA2066 hw2.1: add to
WLAN.HSP.1.1-03926.13-QCAHSPSWPL_V2_SILICONZ_CE-2.52297.3
* ath11k: QCA2066 hw2.1: add board-2.bin
* ath11k: IPQ5018 hw1.0: update to WLAN.HK.2.6.0.1-01291-QCAHKSWPL_SILICONZ-1
* qcom: vpu: add video firmware for sa8775p
* amdgpu: DMCUB updates for various AMDGPU ASICs
* Update to version 20240809 (git commit 36db650dae03):
* qcom: update path for video firmware for vpu-1/2/3.0
* QCA: Update Bluetooth WCN685x 2.1 firmware to 2.1.0-00642
* rtw89: 8852c: add fw format-1 v0.27.97.0
* rtw89: 8852bt: add firmware 0.29.91.0
* amdgpu: Update ISP FW for isp v4.1.1
* mediatek: Update mt8195 SOF firmware
* amdgpu: DMCUB updates for DCN314
* xe: First GuC release v70.29.2 for BMG
* xe: Add GuC v70.29.2 for LNL
* i915: Add GuC v70.29.2 for ADL-P, DG1, DG2, MTL, and TGL
* i915: Update MTL DMC v2.22
* i915: update MTL GSC to v102.0.10.1878
* xe: Add BMG HuC 8.2.10
* xe: Add GSC 104.0.0.1161 for LNL
* xe: Add LNL HuC 9.4.13
* i915: update DG2 HuC to v7.10.16
* amdgpu: Update ISP FW for isp v4.1.1
* QCA: Update Bluetooth QCA2066 firmware to 2.1.0-00641
* Issues already fixed in past releases:
* CVE-2023-31315: Fixed improper validation in a model specific register (MSR)
could allow a malicious program with ring0 access to modify SMM
configuration (bsc#1229069)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4255=1 openSUSE-SLE-15.6-2024-4255=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4255=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* kernel-firmware-usb-network-20241128-150600.3.9.1
* kernel-firmware-iwlwifi-20241128-150600.3.9.1
* kernel-firmware-serial-20241128-150600.3.9.1
* ucode-amd-20241128-150600.3.9.1
* kernel-firmware-liquidio-20241128-150600.3.9.1
* kernel-firmware-i915-20241128-150600.3.9.1
* kernel-firmware-network-20241128-150600.3.9.1
* kernel-firmware-atheros-20241128-150600.3.9.1
* kernel-firmware-mellanox-20241128-150600.3.9.1
* kernel-firmware-all-20241128-150600.3.9.1
* kernel-firmware-20241128-150600.3.9.1
* kernel-firmware-chelsio-20241128-150600.3.9.1
* kernel-firmware-mwifiex-20241128-150600.3.9.1
* kernel-firmware-radeon-20241128-150600.3.9.1
* kernel-firmware-media-20241128-150600.3.9.1
* kernel-firmware-sound-20241128-150600.3.9.1
* kernel-firmware-qlogic-20241128-150600.3.9.1
* kernel-firmware-realtek-20241128-150600.3.9.1
* kernel-firmware-ti-20241128-150600.3.9.1
* kernel-firmware-nvidia-20241128-150600.3.9.1
* kernel-firmware-dpaa2-20241128-150600.3.9.1
* kernel-firmware-mediatek-20241128-150600.3.9.1
* kernel-firmware-qcom-20241128-150600.3.9.1
* kernel-firmware-ath12k-20241128-150600.3.9.1
* kernel-firmware-intel-20241128-150600.3.9.1
* kernel-firmware-bnx2-20241128-150600.3.9.1
* kernel-firmware-marvell-20241128-150600.3.9.1
* kernel-firmware-prestera-20241128-150600.3.9.1
* kernel-firmware-nfp-20241128-150600.3.9.1
* kernel-firmware-ath11k-20241128-150600.3.9.1
* kernel-firmware-amdgpu-20241128-150600.3.9.1
* kernel-firmware-ueagle-20241128-150600.3.9.1
* kernel-firmware-platform-20241128-150600.3.9.1
* kernel-firmware-brcm-20241128-150600.3.9.1
* kernel-firmware-bluetooth-20241128-150600.3.9.1
* kernel-firmware-ath10k-20241128-150600.3.9.1
* Basesystem Module 15-SP6 (noarch)
* kernel-firmware-usb-network-20241128-150600.3.9.1
* kernel-firmware-iwlwifi-20241128-150600.3.9.1
* kernel-firmware-serial-20241128-150600.3.9.1
* ucode-amd-20241128-150600.3.9.1
* kernel-firmware-liquidio-20241128-150600.3.9.1
* kernel-firmware-i915-20241128-150600.3.9.1
* kernel-firmware-network-20241128-150600.3.9.1
* kernel-firmware-atheros-20241128-150600.3.9.1
* kernel-firmware-mellanox-20241128-150600.3.9.1
* kernel-firmware-all-20241128-150600.3.9.1
* kernel-firmware-chelsio-20241128-150600.3.9.1
* kernel-firmware-mwifiex-20241128-150600.3.9.1
* kernel-firmware-radeon-20241128-150600.3.9.1
* kernel-firmware-media-20241128-150600.3.9.1
* kernel-firmware-sound-20241128-150600.3.9.1
* kernel-firmware-qlogic-20241128-150600.3.9.1
* kernel-firmware-realtek-20241128-150600.3.9.1
* kernel-firmware-ti-20241128-150600.3.9.1
* kernel-firmware-nvidia-20241128-150600.3.9.1
* kernel-firmware-dpaa2-20241128-150600.3.9.1
* kernel-firmware-mediatek-20241128-150600.3.9.1
* kernel-firmware-qcom-20241128-150600.3.9.1
* kernel-firmware-ath12k-20241128-150600.3.9.1
* kernel-firmware-intel-20241128-150600.3.9.1
* kernel-firmware-bnx2-20241128-150600.3.9.1
* kernel-firmware-marvell-20241128-150600.3.9.1
* kernel-firmware-prestera-20241128-150600.3.9.1
* kernel-firmware-nfp-20241128-150600.3.9.1
* kernel-firmware-ath11k-20241128-150600.3.9.1
* kernel-firmware-amdgpu-20241128-150600.3.9.1
* kernel-firmware-ueagle-20241128-150600.3.9.1
* kernel-firmware-platform-20241128-150600.3.9.1
* kernel-firmware-brcm-20241128-150600.3.9.1
* kernel-firmware-bluetooth-20241128-150600.3.9.1
* kernel-firmware-ath10k-20241128-150600.3.9.1
## References:
* https://www.suse.com/security/cve/CVE-2023-31315.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229069
* https://bugzilla.suse.com/show_bug.cgi?id=1229272
* https://bugzilla.suse.com/show_bug.cgi?id=1230007
* https://bugzilla.suse.com/show_bug.cgi?id=1230596
* https://bugzilla.suse.com/show_bug.cgi?id=1234027
1
0
SUSE-SU-2024:4256-1: important: Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3)
Announcement ID: SUSE-SU-2024:4256-1
Release Date: 2024-12-06T19:03:50Z
Rating: important
References:
* bsc#1210619
* bsc#1218487
* bsc#1220145
* bsc#1220537
* bsc#1221302
* bsc#1222685
* bsc#1223059
* bsc#1223363
* bsc#1223514
* bsc#1223683
* bsc#1225013
* bsc#1225202
* bsc#1225211
* bsc#1225302
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225733
* bsc#1225819
* bsc#1226325
* bsc#1227471
* bsc#1227651
* bsc#1228573
* bsc#1229553
Cross-References:
* CVE-2021-46955
* CVE-2021-47291
* CVE-2021-47378
* CVE-2021-47383
* CVE-2021-47402
* CVE-2021-47598
* CVE-2022-48651
* CVE-2023-1829
* CVE-2023-52752
* CVE-2023-6531
* CVE-2023-6546
* CVE-2024-23307
* CVE-2024-26610
* CVE-2024-26828
* CVE-2024-26852
* CVE-2024-26923
* CVE-2024-27398
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35864
* CVE-2024-35950
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-46955 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-46955 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47378 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47383 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47402 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves 25 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_153 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2021-47291: ipv6: fix another slab-out-of-bounds in
fib6_nh_flush_exceptions (bsc#1227651).
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2021-47402: Protect fl_walk() with rcu (bsc#1225301)
* CVE-2021-47378: Destroy cm id before destroy qp to avoid use after free
(bsc#1225202).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
* CVE-2021-47383: Fixed out-of-bound vmalloc access in imageblit
(bsc#1225211).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
* CVE-2021-46955: Fixed an out-of-bounds read with openvswitch, when
fragmenting IPv4 packets (bsc#1220537).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1220145).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223059).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223514).
* CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via
the GSMIOC_SETCONF ioctl that could lead to local privilege escalation
(bsc#1222685).
* CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix
garbage collector's deletion of SKB races with unix_stream_read_generic()on
the socket that the SKB is queued on (bsc#1218487).
* CVE-2023-1829: Fixed a use-after-free vulnerability in the control index
filter (tcindex) (bsc#1210619).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4256=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4256=1
## Package List:
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP3_Update_42-debugsource-10-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_153-default-10-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_153-default-debuginfo-10-150300.7.6.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_153-preempt-10-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_153-preempt-debuginfo-10-150300.7.6.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_153-default-10-150300.7.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-46955.html
* https://www.suse.com/security/cve/CVE-2021-47291.html
* https://www.suse.com/security/cve/CVE-2021-47378.html
* https://www.suse.com/security/cve/CVE-2021-47383.html
* https://www.suse.com/security/cve/CVE-2021-47402.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2023-1829.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-6531.html
* https://www.suse.com/security/cve/CVE-2023-6546.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1210619
* https://bugzilla.suse.com/show_bug.cgi?id=1218487
* https://bugzilla.suse.com/show_bug.cgi?id=1220145
* https://bugzilla.suse.com/show_bug.cgi?id=1220537
* https://bugzilla.suse.com/show_bug.cgi?id=1221302
* https://bugzilla.suse.com/show_bug.cgi?id=1222685
* https://bugzilla.suse.com/show_bug.cgi?id=1223059
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223514
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225202
* https://bugzilla.suse.com/show_bug.cgi?id=1225211
* https://bugzilla.suse.com/show_bug.cgi?id=1225302
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1227651
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-RU-2024:4244-1: moderate: Recommended update for shared-mime-info
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Recommended update for shared-mime-info
Announcement ID: SUSE-RU-2024:4244-1
Release Date: 2024-12-06T13:04:44Z
Rating: moderate
References:
* bsc#1231463
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for shared-mime-info fixes the following issue:
* Uninstall silently if update-mime-database is not present (bsc#1231463).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4244=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4244=1 openSUSE-SLE-15.6-2024-4244=1
## Package List:
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* shared-mime-info-2.4-150600.3.3.2
* shared-mime-info-debugsource-2.4-150600.3.3.2
* shared-mime-info-debuginfo-2.4-150600.3.3.2
* Basesystem Module 15-SP6 (noarch)
* shared-mime-info-lang-2.4-150600.3.3.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* shared-mime-info-2.4-150600.3.3.2
* shared-mime-info-debugsource-2.4-150600.3.3.2
* shared-mime-info-debuginfo-2.4-150600.3.3.2
* openSUSE Leap 15.6 (noarch)
* shared-mime-info-lang-2.4-150600.3.3.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1231463
1
0
06 Dec '24
# Recommended update for 389-ds
Announcement ID: SUSE-RU-2024:4245-1
Release Date: 2024-12-06T14:00:55Z
Rating: important
References:
* bsc#1230852
Affected Products:
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for 389-ds fixes the following issues:
* Persist extracted key path for ldap_ssl_client_init over repeat invocations
(bsc#1230852)
* pamModuleIsThreadSafe is missing in the schema
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4245=1 openSUSE-SLE-15.5-2024-4245=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-4245=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* 389-ds-snmp-debuginfo-2.2.10~git24.9b5efd9f-150500.3.29.1
* 389-ds-2.2.10~git24.9b5efd9f-150500.3.29.1
* libsvrcore0-2.2.10~git24.9b5efd9f-150500.3.29.1
* 389-ds-debuginfo-2.2.10~git24.9b5efd9f-150500.3.29.1
* 389-ds-debugsource-2.2.10~git24.9b5efd9f-150500.3.29.1
* 389-ds-snmp-2.2.10~git24.9b5efd9f-150500.3.29.1
* libsvrcore0-debuginfo-2.2.10~git24.9b5efd9f-150500.3.29.1
* 389-ds-devel-2.2.10~git24.9b5efd9f-150500.3.29.1
* lib389-2.2.10~git24.9b5efd9f-150500.3.29.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* 389-ds-2.2.10~git24.9b5efd9f-150500.3.29.1
* libsvrcore0-2.2.10~git24.9b5efd9f-150500.3.29.1
* 389-ds-debuginfo-2.2.10~git24.9b5efd9f-150500.3.29.1
* 389-ds-debugsource-2.2.10~git24.9b5efd9f-150500.3.29.1
* libsvrcore0-debuginfo-2.2.10~git24.9b5efd9f-150500.3.29.1
* 389-ds-devel-2.2.10~git24.9b5efd9f-150500.3.29.1
* lib389-2.2.10~git24.9b5efd9f-150500.3.29.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230852
1
0
SUSE-SU-2024:4240-1: important: Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:4240-1
Release Date: 2024-12-06T12:33:47Z
Rating: important
References:
* bsc#1225429
* bsc#1229553
Cross-References:
* CVE-2021-47517
* CVE-2024-43861
CVSS scores:
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_73 fixes several issues.
The following security issues were fixed:
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225429).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4240=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4240=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_73-default-2-150500.11.6.1
* kernel-livepatch-5_14_21-150500_55_73-default-debuginfo-2-150500.11.6.1
* kernel-livepatch-SLE15-SP5_Update_17-debugsource-2-150500.11.6.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_73-default-2-150500.11.6.1
* kernel-livepatch-5_14_21-150500_55_73-default-debuginfo-2-150500.11.6.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le x86_64)
* kernel-livepatch-SLE15-SP5_Update_17-debugsource-2-150500.11.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225429
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4243-1: important: Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:4243-1
Release Date: 2024-12-06T13:04:12Z
Rating: important
References:
* bsc#1223363
* bsc#1223683
* bsc#1225011
* bsc#1225012
* bsc#1225013
* bsc#1225099
* bsc#1225309
* bsc#1225311
* bsc#1225312
* bsc#1225429
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1226327
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229273
* bsc#1229553
Cross-References:
* CVE-2021-47517
* CVE-2021-47598
* CVE-2023-52752
* CVE-2023-52846
* CVE-2024-26828
* CVE-2024-26923
* CVE-2024-27398
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35867
* CVE-2024-35905
* CVE-2024-35949
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 20 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_62 fixes several issues.
The following security issues were fixed:
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225429).
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1229273).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1225011).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4243=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4243=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_62-default-7-150500.11.6.1
* kernel-livepatch-SLE15-SP5_Update_13-debugsource-7-150500.11.6.1
* kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-7-150500.11.6.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_62-default-7-150500.11.6.1
* kernel-livepatch-SLE15-SP5_Update_13-debugsource-7-150500.11.6.1
* kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-7-150500.11.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225011
* https://bugzilla.suse.com/show_bug.cgi?id=1225012
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225429
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1226327
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229273
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4246-1: important: Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3)
Announcement ID: SUSE-SU-2024:4246-1
Release Date: 2024-12-06T14:03:50Z
Rating: important
References:
* bsc#1223683
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225733
* bsc#1225819
* bsc#1226325
* bsc#1227471
* bsc#1227651
* bsc#1228573
* bsc#1229553
Cross-References:
* CVE-2021-47291
* CVE-2021-47598
* CVE-2023-52752
* CVE-2024-26923
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35864
* CVE-2024-35950
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47291 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves 12 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_164 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2021-47291: ipv6: fix another slab-out-of-bounds in
fib6_nh_flush_exceptions (bsc#1227651).
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223384).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4246=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4246=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_164-default-5-150300.7.6.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_164-default-5-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_164-default-debuginfo-5-150300.7.6.1
* kernel-livepatch-SLE15-SP3_Update_45-debugsource-5-150300.7.6.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_164-preempt-5-150300.7.6.1
* kernel-livepatch-5_3_18-150300_59_164-preempt-debuginfo-5-150300.7.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47291.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1227651
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
06 Dec '24
# Recommended update for crmsh
Announcement ID: SUSE-RU-2024:4223-1
Release Date: 2024-12-06T09:19:15Z
Rating: moderate
References:
* bsc#1232821
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for crmsh fixes the following issues:
* Version update 4.6.0+20241111.68fcc6d:
* Fix: report.utils: Fix the performance issue (bsc#1232821).
* Fix: report.collect: Make sure log is not [None] before using it
(bsc#1232821).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-4223=1 openSUSE-SLE-15.6-2024-4223=1
* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-4223=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* crmsh-4.6.0+20241111.68fcc6d-150600.3.17.2
* crmsh-scripts-4.6.0+20241111.68fcc6d-150600.3.17.2
* crmsh-test-4.6.0+20241111.68fcc6d-150600.3.17.2
* SUSE Linux Enterprise High Availability Extension 15 SP6 (noarch)
* crmsh-4.6.0+20241111.68fcc6d-150600.3.17.2
* crmsh-scripts-4.6.0+20241111.68fcc6d-150600.3.17.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1232821
1
0
06 Dec '24
# Recommended update for glibc
Announcement ID: SUSE-RU-2024:4224-1
Release Date: 2024-12-06T09:24:59Z
Rating: moderate
References:
* bsc#1233699
Affected Products:
* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for glibc fixes the following issue:
* Remove nss-systemd from default nsswitch.conf (bsc#1233699).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4224=1 SUSE-2024-4224=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-4224=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4224=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* glibc-debuginfo-2.38-150600.14.17.2
* glibc-2.38-150600.14.17.2
* glibc-devel-2.38-150600.14.17.2
* glibc-devel-static-2.38-150600.14.17.2
* glibc-extra-debuginfo-2.38-150600.14.17.2
* glibc-locale-2.38-150600.14.17.2
* glibc-utils-src-debugsource-2.38-150600.14.17.2
* glibc-utils-debuginfo-2.38-150600.14.17.2
* glibc-locale-base-2.38-150600.14.17.2
* glibc-debugsource-2.38-150600.14.17.2
* glibc-locale-base-debuginfo-2.38-150600.14.17.2
* nscd-debuginfo-2.38-150600.14.17.2
* libnsl1-2.38-150600.14.17.2
* glibc-devel-debuginfo-2.38-150600.14.17.2
* glibc-extra-2.38-150600.14.17.2
* glibc-utils-2.38-150600.14.17.2
* glibc-profile-2.38-150600.14.17.2
* nscd-2.38-150600.14.17.2
* libnsl1-debuginfo-2.38-150600.14.17.2
* openSUSE Leap 15.6 (x86_64)
* glibc-devel-32bit-debuginfo-2.38-150600.14.17.1
* glibc-locale-base-32bit-2.38-150600.14.17.1
* glibc-32bit-2.38-150600.14.17.1
* glibc-locale-base-32bit-debuginfo-2.38-150600.14.17.1
* glibc-devel-static-32bit-2.38-150600.14.17.1
* glibc-32bit-debuginfo-2.38-150600.14.17.1
* glibc-utils-32bit-debuginfo-2.38-150600.14.17.2
* glibc-utils-32bit-2.38-150600.14.17.2
* glibc-profile-32bit-2.38-150600.14.17.1
* libnsl1-32bit-2.38-150600.14.17.1
* libnsl1-32bit-debuginfo-2.38-150600.14.17.1
* glibc-devel-32bit-2.38-150600.14.17.1
* openSUSE Leap 15.6 (noarch)
* glibc-info-2.38-150600.14.17.2
* glibc-html-2.38-150600.14.17.2
* glibc-lang-2.38-150600.14.17.2
* glibc-i18ndata-2.38-150600.14.17.2
* openSUSE Leap 15.6 (i686)
* glibc-locale-2.38-150600.14.17.1
* libnsl1-2.38-150600.14.17.1
* glibc-locale-base-debuginfo-2.38-150600.14.17.1
* libnsl1-debuginfo-2.38-150600.14.17.1
* glibc-debugsource-2.38-150600.14.17.1
* glibc-devel-debuginfo-2.38-150600.14.17.1
* glibc-2.38-150600.14.17.1
* glibc-devel-static-2.38-150600.14.17.1
* glibc-profile-2.38-150600.14.17.1
* glibc-devel-2.38-150600.14.17.1
* glibc-locale-base-2.38-150600.14.17.1
* glibc-debuginfo-2.38-150600.14.17.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* glibc-profile-64bit-2.38-150600.14.17.2
* glibc-64bit-2.38-150600.14.17.2
* glibc-64bit-debuginfo-2.38-150600.14.17.2
* libnsl1-64bit-2.38-150600.14.17.2
* glibc-utils-64bit-debuginfo-2.38-150600.14.17.2
* glibc-utils-64bit-2.38-150600.14.17.2
* glibc-devel-static-64bit-2.38-150600.14.17.2
* glibc-locale-base-64bit-2.38-150600.14.17.2
* glibc-devel-64bit-debuginfo-2.38-150600.14.17.2
* libnsl1-64bit-debuginfo-2.38-150600.14.17.2
* glibc-devel-64bit-2.38-150600.14.17.2
* glibc-locale-base-64bit-debuginfo-2.38-150600.14.17.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* glibc-debuginfo-2.38-150600.14.17.2
* glibc-2.38-150600.14.17.2
* glibc-devel-2.38-150600.14.17.2
* glibc-extra-debuginfo-2.38-150600.14.17.2
* glibc-locale-2.38-150600.14.17.2
* glibc-locale-base-2.38-150600.14.17.2
* glibc-debugsource-2.38-150600.14.17.2
* glibc-locale-base-debuginfo-2.38-150600.14.17.2
* nscd-debuginfo-2.38-150600.14.17.2
* libnsl1-2.38-150600.14.17.2
* glibc-devel-debuginfo-2.38-150600.14.17.2
* glibc-extra-2.38-150600.14.17.2
* glibc-profile-2.38-150600.14.17.2
* nscd-2.38-150600.14.17.2
* libnsl1-debuginfo-2.38-150600.14.17.2
* Basesystem Module 15-SP6 (noarch)
* glibc-info-2.38-150600.14.17.2
* glibc-lang-2.38-150600.14.17.2
* glibc-i18ndata-2.38-150600.14.17.2
* Basesystem Module 15-SP6 (x86_64)
* glibc-locale-base-32bit-2.38-150600.14.17.1
* glibc-32bit-2.38-150600.14.17.1
* glibc-locale-base-32bit-debuginfo-2.38-150600.14.17.1
* glibc-32bit-debuginfo-2.38-150600.14.17.1
* libnsl1-32bit-2.38-150600.14.17.1
* libnsl1-32bit-debuginfo-2.38-150600.14.17.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* glibc-debuginfo-2.38-150600.14.17.2
* glibc-devel-static-2.38-150600.14.17.2
* glibc-utils-src-debugsource-2.38-150600.14.17.2
* glibc-utils-debuginfo-2.38-150600.14.17.2
* glibc-debugsource-2.38-150600.14.17.2
* glibc-utils-2.38-150600.14.17.2
* Development Tools Module 15-SP6 (x86_64)
* glibc-devel-32bit-debuginfo-2.38-150600.14.17.1
* glibc-32bit-debuginfo-2.38-150600.14.17.1
* glibc-devel-32bit-2.38-150600.14.17.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1233699
1
0
06 Dec '24
# Recommended update for python-kiwi
Announcement ID: SUSE-RU-2024:4238-1
Release Date: 2024-12-06T11:44:02Z
Rating: important
References:
* bsc#1233196
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for python-kiwi fixes the following issues:
* Fixed boot support for ISO media on Power PC architecture
* Update documentation configuration to match with latest theme
* Set grub-bls default to false for SUSE Linux Enterprise 15 (bsc#1233196)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-4238=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-4238=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-4238=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4238=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-4238=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4238=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-4238=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-4238=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4238=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-4238=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4238=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4238=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4238=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4238=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4238=1
* SUSE Linux Enterprise Server 15 SP2 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4238=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4238=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4238=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4238=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4238=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4238=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-4238=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-4238=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4238=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-4238=1
## Package List:
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* openSUSE Leap 15.5 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* openSUSE Leap 15.6 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* Development Tools Module 15-SP5 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* Development Tools Module 15-SP6 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (aarch64
x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server 15 SP2 LTSS (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.90.1
* kiwi-systemdeps-core-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* kiwi-tools-debuginfo-9.24.43-150100.3.90.1
* kiwi-systemdeps-containers-9.24.43-150100.3.90.1
* dracut-kiwi-overlay-9.24.43-150100.3.90.1
* kiwi-systemdeps-9.24.43-150100.3.90.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.90.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.90.1
* dracut-kiwi-live-9.24.43-150100.3.90.1
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* kiwi-tools-9.24.43-150100.3.90.1
* kiwi-man-pages-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* python3-kiwi-9.24.43-150100.3.90.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.90.1
* SUSE Enterprise Storage 7.1 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* dracut-kiwi-lib-9.24.43-150100.3.90.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.90.1
* python-kiwi-debugsource-9.24.43-150100.3.90.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.90.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1233196
1
0
SUSE-SU-2024:4227-1: important: Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:4227-1
Release Date: 2024-12-06T10:03:53Z
Rating: important
References:
* bsc#1225429
* bsc#1225733
* bsc#1229273
* bsc#1229553
Cross-References:
* CVE-2021-47517
* CVE-2024-35949
* CVE-2024-36904
* CVE-2024-43861
CVSS scores:
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves four vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_39 fixes several issues.
The following security issues were fixed:
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225429).
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1229273).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4227=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4227=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_39-default-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_8-debugsource-14-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-14-150500.2.1
* kernel-livepatch-5_14_21-150500_55_39-default-14-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_8-debugsource-14-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225429
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1229273
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4228-1: important: Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)
Announcement ID: SUSE-SU-2024:4228-1
Release Date: 2024-12-06T10:04:04Z
Rating: important
References:
* bsc#1223683
* bsc#1225099
* bsc#1225429
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1227471
* bsc#1228349
* bsc#1228573
* bsc#1228786
* bsc#1229273
* bsc#1229553
Cross-References:
* CVE-2021-47517
* CVE-2021-47598
* CVE-2023-52752
* CVE-2023-52846
* CVE-2024-26923
* CVE-2024-35949
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-40909
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35949 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 12 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_68 fixes several issues.
The following security issues were fixed:
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225429).
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks
(bsc#1229273).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free()
(bsc#1228349).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223384).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-4228=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-4228=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_68-default-6-150500.11.6.1
* kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-6-150500.11.6.1
* kernel-livepatch-SLE15-SP5_Update_15-debugsource-6-150500.11.6.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_68-default-6-150500.11.6.1
* kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-6-150500.11.6.1
* kernel-livepatch-SLE15-SP5_Update_15-debugsource-6-150500.11.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-35949.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-40909.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225429
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228349
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229273
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4230-1: important: Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3)
Announcement ID: SUSE-SU-2024:4230-1
Release Date: 2024-12-06T10:34:14Z
Rating: important
References:
* bsc#1225733
* bsc#1229553
Cross-References:
* CVE-2024-36904
* CVE-2024-43861
CVSS scores:
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP2
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_150 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP2
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-4230=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-4232=1 SUSE-2024-4233=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-4232=1 SUSE-SLE-
Module-Live-Patching-15-SP3-2024-4233=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP2_Update_43-debugsource-14-150200.2.1
* kernel-livepatch-5_3_18-150200_24_172-default-14-150200.2.1
* kernel-livepatch-5_3_18-150200_24_172-default-debuginfo-14-150200.2.1
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP3_Update_41-debugsource-13-150300.2.1
* kernel-livepatch-5_3_18-150300_59_150-default-debuginfo-13-150300.2.1
* kernel-livepatch-5_3_18-150300_59_150-default-13-150300.2.1
* kernel-livepatch-5_3_18-150300_59_147-default-14-150300.2.1
* kernel-livepatch-SLE15-SP3_Update_40-debugsource-14-150300.2.1
* kernel-livepatch-5_3_18-150300_59_147-default-debuginfo-14-150300.2.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_150-preempt-13-150300.2.1
* kernel-livepatch-5_3_18-150300_59_147-preempt-debuginfo-14-150300.2.1
* kernel-livepatch-5_3_18-150300_59_150-preempt-debuginfo-13-150300.2.1
* kernel-livepatch-5_3_18-150300_59_147-preempt-14-150300.2.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_147-default-14-150300.2.1
* kernel-livepatch-5_3_18-150300_59_150-default-13-150300.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
1
0
SUSE-SU-2024:4234-1: important: Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP4)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4234-1
Release Date: 2024-12-06T10:34:29Z
Rating: important
References:
* bsc#1219296
* bsc#1220145
* bsc#1220211
* bsc#1220828
* bsc#1220832
* bsc#1221302
* bsc#1222685
* bsc#1222882
* bsc#1223059
* bsc#1223363
* bsc#1223514
* bsc#1223521
* bsc#1223681
* bsc#1223683
* bsc#1225011
* bsc#1225012
* bsc#1225013
* bsc#1225099
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225313
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229553
* bsc#1231353
Cross-References:
* CVE-2021-47598
* CVE-2022-48651
* CVE-2022-48662
* CVE-2023-52340
* CVE-2023-52502
* CVE-2023-52752
* CVE-2023-52846
* CVE-2023-6546
* CVE-2024-23307
* CVE-2024-26585
* CVE-2024-26610
* CVE-2024-26622
* CVE-2024-26766
* CVE-2024-26828
* CVE-2024-26852
* CVE-2024-26923
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-35817
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35867
* CVE-2024-35950
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52340 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52340 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52502 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52502 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26585 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26585 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26622 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves 31 vulnerabilities and has one security fix can now be
installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_108 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1225011).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP)
(bsc#1231353)
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223521).
* CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1220145).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223059).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223514).
* CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
(bsc#1222882).
* CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and
nfc_llcp_sock_get_sn() (bsc#1220832).
* CVE-2024-26585: Fixed race between tx work scheduling and socket close
(bsc#1220211).
* CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via
the GSMIOC_SETCONF ioctl that could lead to local privilege escalation
(bsc#1222685).
* CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220828).
* CVE-2023-52340: Fixed a denial of service related to ICMPv6 'Packet Too Big'
packets (bsc#1219296).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4234=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4234=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_23-debugsource-11-150400.9.8.1
* kernel-livepatch-5_14_21-150400_24_108-default-debuginfo-11-150400.9.8.1
* kernel-livepatch-5_14_21-150400_24_108-default-11-150400.9.8.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_23-debugsource-11-150400.9.8.1
* kernel-livepatch-5_14_21-150400_24_108-default-debuginfo-11-150400.9.8.1
* kernel-livepatch-5_14_21-150400_24_108-default-11-150400.9.8.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2023-52340.html
* https://www.suse.com/security/cve/CVE-2023-52502.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2023-6546.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-26585.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26622.html
* https://www.suse.com/security/cve/CVE-2024-26766.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219296
* https://bugzilla.suse.com/show_bug.cgi?id=1220145
* https://bugzilla.suse.com/show_bug.cgi?id=1220211
* https://bugzilla.suse.com/show_bug.cgi?id=1220828
* https://bugzilla.suse.com/show_bug.cgi?id=1220832
* https://bugzilla.suse.com/show_bug.cgi?id=1221302
* https://bugzilla.suse.com/show_bug.cgi?id=1222685
* https://bugzilla.suse.com/show_bug.cgi?id=1222882
* https://bugzilla.suse.com/show_bug.cgi?id=1223059
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223514
* https://bugzilla.suse.com/show_bug.cgi?id=1223521
* https://bugzilla.suse.com/show_bug.cgi?id=1223681
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225011
* https://bugzilla.suse.com/show_bug.cgi?id=1225012
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225313
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
* https://bugzilla.suse.com/show_bug.cgi?id=1231353
1
0
SUSE-SU-2024:4235-1: important: Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4235-1
Release Date: 2024-12-06T10:34:50Z
Rating: important
References:
* bsc#1220145
* bsc#1221302
* bsc#1222882
* bsc#1223059
* bsc#1223363
* bsc#1223514
* bsc#1223521
* bsc#1223681
* bsc#1223683
* bsc#1225011
* bsc#1225012
* bsc#1225013
* bsc#1225099
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225313
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1226327
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229553
* bsc#1231353
Cross-References:
* CVE-2021-47598
* CVE-2022-48651
* CVE-2022-48662
* CVE-2023-52752
* CVE-2023-52846
* CVE-2024-23307
* CVE-2024-26610
* CVE-2024-26766
* CVE-2024-26828
* CVE-2024-26852
* CVE-2024-26923
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-35817
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35867
* CVE-2024-35905
* CVE-2024-35950
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves 27 vulnerabilities and has one security fix can now be
installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_116 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1225011).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP)
(bsc#1231353)
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2022-48662: Fixed a general protection fault (GPF) in
i915_perf_open_ioctl (bsc#1223521).
* CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1220145).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223059).
* CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221302).
* CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset
skb->mac_header (bsc#1223514).
* CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs()
(bsc#1222882).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4235=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4235=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_116-default-9-150400.9.8.1
* kernel-livepatch-SLE15-SP4_Update_25-debugsource-9-150400.9.8.1
* kernel-livepatch-5_14_21-150400_24_116-default-debuginfo-9-150400.9.8.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_116-default-9-150400.9.8.1
* kernel-livepatch-SLE15-SP4_Update_25-debugsource-9-150400.9.8.1
* kernel-livepatch-5_14_21-150400_24_116-default-debuginfo-9-150400.9.8.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2022-48651.html
* https://www.suse.com/security/cve/CVE-2022-48662.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-26610.html
* https://www.suse.com/security/cve/CVE-2024-26766.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220145
* https://bugzilla.suse.com/show_bug.cgi?id=1221302
* https://bugzilla.suse.com/show_bug.cgi?id=1222882
* https://bugzilla.suse.com/show_bug.cgi?id=1223059
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223514
* https://bugzilla.suse.com/show_bug.cgi?id=1223521
* https://bugzilla.suse.com/show_bug.cgi?id=1223681
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225011
* https://bugzilla.suse.com/show_bug.cgi?id=1225012
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225313
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1226327
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
* https://bugzilla.suse.com/show_bug.cgi?id=1231353
1
0
SUSE-SU-2024:4236-1: important: Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4)
by OPENSUSE-UPDATES 06 Dec '24
by OPENSUSE-UPDATES 06 Dec '24
06 Dec '24
# Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4)
Announcement ID: SUSE-SU-2024:4236-1
Release Date: 2024-12-06T10:35:07Z
Rating: important
References:
* bsc#1223059
* bsc#1223363
* bsc#1223681
* bsc#1223683
* bsc#1225011
* bsc#1225012
* bsc#1225013
* bsc#1225099
* bsc#1225309
* bsc#1225310
* bsc#1225311
* bsc#1225312
* bsc#1225313
* bsc#1225733
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1226327
* bsc#1227471
* bsc#1228573
* bsc#1228786
* bsc#1229553
* bsc#1231353
Cross-References:
* CVE-2021-47598
* CVE-2023-52752
* CVE-2023-52846
* CVE-2024-26828
* CVE-2024-26852
* CVE-2024-26923
* CVE-2024-26930
* CVE-2024-27398
* CVE-2024-35817
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35867
* CVE-2024-35905
* CVE-2024-35950
* CVE-2024-36899
* CVE-2024-36904
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-41059
* CVE-2024-43861
CVSS scores:
* CVE-2021-47598 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47598 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26828 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26828 ( NVD ): 6.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-26852 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26852 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26923 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-27398 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35950 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36904 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41059 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves 22 vulnerabilities and has one security fix can now be
installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_119 fixes several issues.
The following security issues were fixed:
* CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique()
(bsc#1225733).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229553).
* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327).
* CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init()
(bsc#1227471).
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1225011).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* Fixed intermittent nfs mount failures (may be due to SUNRPC over UDP)
(bsc#1231353)
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1231353).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228573).
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313).
* CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout
(bsc#1225013).
* CVE-2024-35950: drm/client: Fully protect modes with dev->mode_config.mutex
(bsc#1225310).
* CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in
__unix_gc() (bsc#1223683).
* CVE-2024-26930: Fixed double free of the ha->vp_map pointer (bsc#1223681).
* CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223363).
* CVE-2024-26852: Fixed use-after-free in ip6_route_mpath_notify()
(bsc#1223059).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-4236=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-4236=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-8-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_26-debugsource-8-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_119-default-8-150400.9.6.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-8-150400.9.6.1
* kernel-livepatch-SLE15-SP4_Update_26-debugsource-8-150400.9.6.1
* kernel-livepatch-5_14_21-150400_24_119-default-8-150400.9.6.1
## References:
* https://www.suse.com/security/cve/CVE-2021-47598.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2024-26828.html
* https://www.suse.com/security/cve/CVE-2024-26852.html
* https://www.suse.com/security/cve/CVE-2024-26923.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-27398.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-35950.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36904.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-41059.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223059
* https://bugzilla.suse.com/show_bug.cgi?id=1223363
* https://bugzilla.suse.com/show_bug.cgi?id=1223681
* https://bugzilla.suse.com/show_bug.cgi?id=1223683
* https://bugzilla.suse.com/show_bug.cgi?id=1225011
* https://bugzilla.suse.com/show_bug.cgi?id=1225012
* https://bugzilla.suse.com/show_bug.cgi?id=1225013
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225310
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225313
* https://bugzilla.suse.com/show_bug.cgi?id=1225733
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1226327
* https://bugzilla.suse.com/show_bug.cgi?id=1227471
* https://bugzilla.suse.com/show_bug.cgi?id=1228573
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1229553
* https://bugzilla.suse.com/show_bug.cgi?id=1231353
1
0